SQL注入漏洞快速检测技术的研究
[Abstract]:With the rapid development of Internet era, the application of web-based development is becoming more and more mature, and the technology is becoming more and more complex. Due to the rich functional characteristics of the web application, and the ability to compare, process and propagate the information through the Internet, the web application is easy to become a popular attack target. Therefore, in order to guarantee the security of the web application, it is necessary to detect the security vulnerability of the web application in advance. In the top ten most popular web security vulnerabilities published by OWASP in 2013, an injection vulnerability (mainly SQL injection vulnerability) topped the first major flaw. Therefore, it is very important to study the research of SQL injection vulnerability detection technology. This paper first summarizes the background and significance of the research on SQL injection vulnerability, and then introduces the development of SQL injection vulnerability detection technology at home and abroad. it has been found that previous studies have focused on the adequacy and accuracy of detection cases (i. e. payloads), almost no studies have been made on the relevance and uniqueness of each test case in a large set of detection examples, and when a sql injection vulnerability detection is performed, It is also only a random selection of the detection example from the payloads set, and the regularity of payloads itself is not taken into account. In this paper, we first introduce the SQL injection vulnerability, then outline some advanced detection techniques in the SQL blind note, finally, based on the existing detection technology defect problem, the optimization improvement is put forward from the point of payloads of SQL injection vulnerability. It mainly includes the following four aspects: (1) optimization based on the letter frequency. sometimes in the case where a SQL injection vulnerability has been determined, when the background database plaintext keyword needs to be guessed, we take into account the frequency problems that each English letter appears in the alphabet, and proposes a way to guess the solution based on the letter frequency to improve the detection efficiency, Further, we also propose a double-letter-group-frequency-based approach to guess de-plaintext keywords to reduce background database requests. (2) Optimization based on combination of letter frequency and binary search. In many cases, we cannot determine whether the keywords to be guessed are processed by encryption or not only English letters are included in the keyword. In view of this situation, this paper proposes a combination of letter frequency and binary search to guess the solution key, first carry on a certain number of letter frequency (including the double-letter group frequency) way guess the solution, then use the binary search way to search, Compared with the alphabet, the search efficiency is greatly improved. (3) Optimization based on automatic extension. In view of the correlation between the detection cases, this paper proposes an automatic extension method to automatically select the next payload which may be used to detect the SQL injection vulnerability. This article mainly extends the automatic expansion from five aspects: case variant extension, coding transformation extension, SQL annotation extension, null byte expansion, and split and balance extension. (4) Optimization based on cache weight. aiming at the defects of the prior random enumeration detection example, the invention provides a method for selecting a test case according to a certain sequence when selecting each test case, namely, selecting a test case by adopting a cache weighting method, firstly classifying the payloads set, and setting a caching mechanism under each classification, storing a plurality of commonly used detection cases with larger weights into a caching mechanism, wherein the caching mechanism has the characteristics of dynamic replacement; when the SQL injection vulnerability detection is carried out, the payload is firstly selected from the caching mechanism, and if the detection is not detected, then the payload is selected from the cache mechanism in sequence for detection. Furthermore, in view of the payloads optimization method proposed in this paper, we prove that these optimization methods have improved the detection efficiency, and the advantages are more obvious for the detection of large engineering projects.
【学位授予单位】:浙江工商大学
【学位级别】:硕士
【学位授予年份】:2017
【分类号】:TP393.08
【相似文献】
相关期刊论文 前10条
1 于爱卿,张桂珍;利用错误信息分析SQL故障[J];青岛远洋船员学院学报;2000年02期
2 蒋丹丹;牛晓楠;;基于SQL的宿舍学生成绩管理系统设计与开发[J];企业技术开发;2012年20期
3 刘艳云;;《数据库设计与实现(SQL)》课程教学改革与实践[J];教育教学论坛;2013年51期
4 任晓东;SQL在中德合作云南二期造林项目管理信息系统中的应用[J];林业调查规划;2005年01期
5 张涛;王行建;;对SQL注入漏洞的研究与防范措施的探讨[J];计算机时代;2006年11期
6 杨应全,汪德彪;解决图书馆SQL服务器连接问题[J];现代情报;2005年09期
7 田yN敏;;基于SQL的高职计算机实验室管理系统的设计与实现[J];中国科教创新导刊;2011年14期
8 肖海蓉;;SQL中分组查询的设计与应用[J];计算机与数字工程;2009年05期
9 徐廷元;白静华;;优化SQL语句降低时间复杂度[J];电脑知识与技术;2009年03期
10 黄保华;马岩;谢统义;;用于SQL注入检测的语句块摘要树模型[J];信息安全与技术;2012年03期
相关会议论文 前2条
1 符俊艺;;用VB和SQL开发交换机话务分析系统[A];海南省通信学会学术年会论文集(2005)[C];2005年
2 朱虹;舒鹏;;扩展SQL实现DBMS细粒度访问控制[A];第二十三届中国数据库学术会议论文集(技术报告篇)[C];2006年
相关重要报纸文章 前10条
1 贵州 王伟;列的别名和SQL语句的格式化[N];电脑报;2004年
2 冬盈;SQL语句的自动优化[N];计算机世界;2002年
3 本报记者 许继楠;新版SQL Server应对大数据和云挑战[N];中国计算机报;2012年
4 贵州 王伟;SQL语句中的函数简介[N];电脑报;2004年
5 ;微软建立SQL中国研发中心[N];人民邮电;2007年
6 郭莹;微软SQL Server 2008添新版本[N];中国计算机报;2008年
7 西安 邹捷;VB中利用SQL语句实现高效数据处理[N];电脑报;2002年
8 ;首只攻击 SQL 服务器的蠕虫现身[N];中国电脑教育报;2002年
9 闵翔;人工智能自动SQL优化[N];中国计算机报;2001年
10 王少青;微软SQL:起于低端,后发制人[N];中国计算机报;2007年
相关硕士学位论文 前10条
1 唐韬;基于HBase的SQL转化引擎研究[D];电子科技大学;2014年
2 刘汉江;SQL注入检测扫描器的设计与实现[D];华南理工大学;2015年
3 李敏儿;餐饮企业外卖订餐系统的设计与实现[D];华南理工大学;2016年
4 章爽敏;SQL注入漏洞快速检测技术的研究[D];浙江工商大学;2017年
5 成晓利;Web应用SQL注入漏洞测试系统的研究与实现[D];西南交通大学;2013年
6 赵阳;基于SQL注入的数据安全测评技术研究[D];沈阳工业大学;2012年
7 赵伟;利用VC与SQL实现管壳式换热器的工艺设计[D];北京化工大学;2003年
8 王一U,
本文编号:2281214
本文链接:https://www.wllwen.com/guanlilunwen/ydhl/2281214.html