2014 International Symposium on Technology Management and Emerging Technologies 2014
DOI: 10.1109/istmet.2014.6936499
|View full text |Cite
|
Sign up to set email alerts
|

SQL injection detection and prevention system with raspberry Pi honeypot cluster for trapping attacker

Abstract: One of the most common security attack for web application is SQL injection. It is an attack to acquire access to application's database through injection of script or malicious query attributes. This attack can be executed in any page of web application which interacts with database. SQL injection could be more dangerous if the victim was an enterprise system such as online banking. Many methods have been researched and developed to prevent SQL injection attacks. One of them is the use of a honeypot. This pap… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 5 publications
0
4
0
Order By: Relevance
“…Cluster in their work has virtualization possibilities in order to satisfy PaaS (Platform-as-a-Service) architecture demands, with the special attention on the portability and container interconnections. The authors of [14] A cluster of 10 Raspberry Pi Model B nodes was used in [15] as a honeypot cluster in researching possibilities for detection and prevention of the SQL injection intruders. In [16], the authors compared a cluster of 14 Raspberry Pi modules with Intel Core i5 and Core i7 CPU computers.…”
Section: Related Workmentioning
confidence: 99%
“…Cluster in their work has virtualization possibilities in order to satisfy PaaS (Platform-as-a-Service) architecture demands, with the special attention on the portability and container interconnections. The authors of [14] A cluster of 10 Raspberry Pi Model B nodes was used in [15] as a honeypot cluster in researching possibilities for detection and prevention of the SQL injection intruders. In [16], the authors compared a cluster of 14 Raspberry Pi modules with Intel Core i5 and Core i7 CPU computers.…”
Section: Related Workmentioning
confidence: 99%
“…The wrong input entered by the user should display an error message rather than displaying all the extra information from the user. This not only helps to avoid any type of injection but also catches the erroneous input For example: SELECT fieldlist FROM table WHERE id = 23 OR 1=1; --This code always matches the simple database of any web server and lets attacker gain access to the sensitive data [7]. Many popular websites have been exploited using this code.…”
Section: Anual Pentestingmentioning
confidence: 99%
“…In [16], authors have discussed possible usage of this device to launch different types of penetration tests to assess the security of a network. [17] uses Raspberry Pi as a Honeypot to detect SQL injection attacks and [18] deployed a Honeypot to simulate vulnerabilities and attract attackers. Hu et al used this device as a distributed vulnerability assessment tool [19].…”
Section: Introductionmentioning
confidence: 99%