scispace - formally typeset
Journal ArticleDOI

Intrusion Detection Systems for Mitigating SQL Injection Attacks: Review and State-of-Practice

Reads0
Chats0
TLDR
The authors compare these tools using the CSIC dataset in order to examine the state-of-practice in database protection from SQL Injection attacks, identifying the main characteristics and implementation details needed for IDSs to successfully detect such attacks.
Abstract
Databases are widely used by organizations to store business-critical information, which makes them one of the most attractive targets for security attacks. SQL Injection is the most common attack to webpages with dynamic content. To mitigate it, organizations use Intrusion Detection Systems (IDS) as part of the security infrastructure, to detect this type of attack. However, the authors observe a gap between the comprehensive state-of-the-art in detecting SQL Injection attacks and the state-of-practice regarding existing tools capable of detecting such attacks. The majority of IDS implementations provide little or no protection against SQL Injection attacks, with exceptions like the tools Bro and ModSecurity. In this article, the authors compare these tools using the CSIC dataset in order to examine the state-of-practice in database protection from SQL Injection attacks, identifying the main characteristics and implementation details needed for IDSs to successfully detect such attacks. The experiments indicate that signature-based IDS provide the greatest coverage against SQL Injection.

read more

Citations
More filters
Journal ArticleDOI

Exploring the use of Iptables as an Application Layer Firewall

TL;DR: This paper explores the use of Iptables for mitigating such application layer attacks, namely SQL injection, Cross-Site Scripting (XSS), HTTP Flood, FTP Flood and FTP Bounce attacks.
Journal ArticleDOI

An Efficient Model to Detect and Prevent SQL Injection Attack

TL;DR: A model to detect and prevent SQL injection attacks, which uses runtime validation to detect the occurrence of such attacks, is proposed, which is adaptable to any existing system, with no need to modify the client or server and either no needs to know web application source code.
References
More filters
Book ChapterDOI

International Organization for Standardization

Anne Marsden, +1 more
TL;DR: An overview of the International Organization for Standardization (ISO) can be found in this paper, where the authors describe the ISO standards most relevant in a clinical laboratory service setting, as well as the process for obtaining and maintaining ISO certification.
Journal ArticleDOI

A Review of Anomaly based Intrusion Detection Systems

TL;DR: The current state of the experiment practice in the field of anomalybased intrusion detection is reviewed and recent studies in this field are surveyed, including summarization study and identification of the drawbacks of formerly surveyed works.
Journal ArticleDOI

An Implementation of Intrusion Detection System Using Genetic Algorithm

TL;DR: An Intrusion Detection System (IDS) by applying genetic algorithm (GA) to efficiently detect various types of network intrusions is presented in this paper, which uses evolution theory to information evolution in order to filter the traffic data and thus reduce the complexity.
Journal ArticleDOI

An implementation of intrusion detection system using genetic algorithm

TL;DR: This approach uses evolution theory to information evolution in order to filter the traffic data and thus reduce the complexity of Intrusion Detection System (IDS), by applying genetic algorithm (GA) to efficiently detect various types of network intrusions.