Title :
Runtime monitors for tautology based SQL injection attacks
Author :
Dharam, Ramya ; Shiva, Sajjan G.
Author_Institution :
Comput. Sci. Dept., Univ. of Memphis, Memphis, TN, USA
Abstract :
Increased usage of web applications in recent years has emphasized the need to achieve (i) confidentiality, (ii) integrity, and (iii) availability of web applications. Backend database being the main target for external attacks such as SQL Injection Attacks, there is an emerging need to handle such attacks to secure stored information. Pre-deployment testing alone does not ensure complete security and hence post-deployment monitoring of web applications during its interaction with the external world can help us to handle SQL Injection Attacks in a better way. In this paper, we present a framework which can be used to handle tautology based SQL Injection Attacks using post-deployment monitoring technique. Our framework uses two pre-deployment testing techniques i.e. basis path and data flow testing techniques to identify legal execution paths of the software. Runtime monitors are then developed and integrated to observe the behavior of the software for identified execution paths such that their violation will help to detect and prevent tautology based SQL Injection Attacks.
Keywords :
Internet; SQL; data flow analysis; data integrity; safety-critical software; Web application availability; backend database; basis path techniques; data confidentiality; data flow testing technique; data integrity; legal execution path; post-deployment monitoring technique; predeployment testing technique; runtime monitors; stored information security; tautology based SQL injection attacks; Databases; Games; Monitoring; Runtime; Security; Software; Testing; Data Flow Testing; Path Testing; Post-deployment Monitoring; Runtime Monitors; SQL Injection Attacks (SQLIAs); Tautology;
Conference_Titel :
Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on
Conference_Location :
Kuala Lumpur
Print_ISBN :
978-1-4673-1425-1
DOI :
10.1109/CyberSec.2012.6246104