基于解析树的SQL注入检测方法研究
发布时间:2021-04-10 04:28
现实web环境中的应用程序存在着许多的安全威胁。在众多的安全威胁中,SQL注入攻击是危险性最高的攻击之一,严重威胁着如金融,娱乐,电子商务等行业的系统安全。与此同时,由于云计算技术的发展,越来越多的应用程序被部署到云中。这些应用程序获得了快速弹性化分配计算资源的能力以及低廉的运营成本等优势。然而,部署在云上的应用程序同样也会遭受SQL注入攻击。SQL注入攻击是一种代码注入攻击方式,它通过利用代码中存在的SQL注入漏洞来攻击后台的数据库系统。该攻击可以导致很多严重的后果,如攻击者可以利用它来绕过身份认证、访问存储在数据库中的用户隐私信息、修改数据库的结构甚至破坏整个数据库。过去的几年里,攻击者设计出了多种攻击手段,如联合查询攻击、恒真式、多查询语句和绕过探测等技术。并且,可以融合多种攻击手段来达到破坏后台数据库系统的目的。SQL注入攻击成功实行的主要原因是用户提交的数据并没有经过充分的安全验证,而被直接拼接成SQL查询语句。因此,开发人员可以通过增加非法输入验证机制来阻止SQL注入攻击。然而这种依靠程序员编程行为的方式并没有取得良好的防御效果。开发人员的任何疏忽大意将会给应用程序带来SQ...
【文章来源】:哈尔滨工业大学黑龙江省 211工程院校 985工程院校
【文章页数】:73 页
【学位级别】:硕士
【文章目录】:
摘要
ABSTRACT
ACKNOWLEDGEMENTS
LIST OF TABLES
LIST OF FIGURES
LIST OF TABLES
CHAPTER 1 INTRODUCTION
1.1 Research background
1.2 Research significance
1.3 Research status
1.3.1 Detecting of SQLIAs in web environments
1.3.2 Detecting SQLIAs in the cloud
1.3.3 Assisted methods
1.4 Contributions of this dissertation
1.5 Organizations of this dissertation
CHAPTER 2 RELATED WORK
2.1 SQL injection attacks
2.2 Classification of SQLIAs
2.2.1 Intentions of SQLIAs
2.2.2 Attack techniques
2.3 Detection mechanisms of SQLIAs
2.3.1. Analysis methods
2.3.2 Taint tracking
2.3.3 Machine learning
2.3.4 Parse tree
2.4 Summary
CHAPTER 3 A DETECTION MECHANISM OF SQLIAS FOR WEBENVIRONMENTS
3.1 Web environments
3.2 SQLIAs in web environments
3.3 The proposed mechanism
3.3.1 Architecture
3.3.2 Detailed algorithms
3.4 Summary
CHAPTER 4 A DETECTION MECHANISM OF SQLIAS FOR CLOUD-ASSISTED WBANS
4.1 Cloud-assisted WBANs
4.2 SQLIAs in cloud-assisted WBANs
4.3 The proposed mechanism
4.3.1 Architecture
4.3.2 Detailed algorithms
4.4 Chapter summary
CHAPTER 5 EXPERIMENTAL RESULTS AND ANALYSIS
5.1 Test set
5.2 Experiments of web environments
5.2.1 Implementation of DSD
5.2.2 Environments setting
5.2.3 Experimental results
5.3 Experiments of cloud-assisted WBANs
5.3.1 Environments setting
5.3.2 Experimental results
5.4 Comparisons of detection methods
5.4.1 Comparison of detection methods by attack types
5.4.2 Comparison of detection methods by characteristics
5.5 Summary
CONCLUSION
REFERENCES
APPENDICES
本文编号:3128959
【文章来源】:哈尔滨工业大学黑龙江省 211工程院校 985工程院校
【文章页数】:73 页
【学位级别】:硕士
【文章目录】:
摘要
ABSTRACT
ACKNOWLEDGEMENTS
LIST OF TABLES
LIST OF FIGURES
LIST OF TABLES
CHAPTER 1 INTRODUCTION
1.1 Research background
1.2 Research significance
1.3 Research status
1.3.1 Detecting of SQLIAs in web environments
1.3.2 Detecting SQLIAs in the cloud
1.3.3 Assisted methods
1.4 Contributions of this dissertation
1.5 Organizations of this dissertation
CHAPTER 2 RELATED WORK
2.1 SQL injection attacks
2.2 Classification of SQLIAs
2.2.1 Intentions of SQLIAs
2.2.2 Attack techniques
2.3 Detection mechanisms of SQLIAs
2.3.1. Analysis methods
2.3.2 Taint tracking
2.3.3 Machine learning
2.3.4 Parse tree
2.4 Summary
CHAPTER 3 A DETECTION MECHANISM OF SQLIAS FOR WEBENVIRONMENTS
3.1 Web environments
3.2 SQLIAs in web environments
3.3 The proposed mechanism
3.3.1 Architecture
3.3.2 Detailed algorithms
3.4 Summary
CHAPTER 4 A DETECTION MECHANISM OF SQLIAS FOR CLOUD-ASSISTED WBANS
4.1 Cloud-assisted WBANs
4.2 SQLIAs in cloud-assisted WBANs
4.3 The proposed mechanism
4.3.1 Architecture
4.3.2 Detailed algorithms
4.4 Chapter summary
CHAPTER 5 EXPERIMENTAL RESULTS AND ANALYSIS
5.1 Test set
5.2 Experiments of web environments
5.2.1 Implementation of DSD
5.2.2 Environments setting
5.2.3 Experimental results
5.3 Experiments of cloud-assisted WBANs
5.3.1 Environments setting
5.3.2 Experimental results
5.4 Comparisons of detection methods
5.4.1 Comparison of detection methods by attack types
5.4.2 Comparison of detection methods by characteristics
5.5 Summary
CONCLUSION
REFERENCES
APPENDICES
本文编号:3128959
本文链接:https://www.wllwen.com/guanlilunwen/ydhl/3128959.html