Detecting SQL Injection Using Correlative Log Analysis

  • Authors

    • T Sreeja
    • Dr Manna Sheela Rani Chetty
    • Sekhar Babu Boddu
    2018-05-31
    https://doi.org/10.14419/ijet.v7i2.32.15720
  • Detection, SQL injection, Web server configuration, database configuration, IDS configuration, log correlation, finite automata.
  • The spiking landscape of cyber-attacks is reflecting its trend towards invoking vulnerabilities in a web application. The vulnerabilities seem to be over-growing second by second beside being over-coming time to time. The reason behind is, new attack vectors are often being deployed by the threat actors. The global cyber security market alone has brought a turnover of about $350 billion, which shows how wide the attack landscape is and how expensive it is to detect, protect and respond to the cyber issues. Most of the security experts have quoted that, the average cost of a data breach will exceed to $150million by 2020 and about 80 percent of the global demography were nowhere aware of such attacks. From the past few years, SQL injection is acting as a major vector in breaching the sensitive data. Detecting SQL injection through log correlation is the most effective methodology utilized under adaptive environments seeking no tool investigation. This paper exposes a detection methodology of an SQL injection attack without any mere concentration on automated tools. The paper goes with a motto of detection through configuring the available resources like web server,database,and an IDS in a way of creating adaptable environment that can bring the entire attacker information through log analysis. The paper would represent the attacker phases in a finite automata.

     

     

  • References

    1. [1] SANS Institute Infosec Reading room

      [2] Muhammad Saidu Aliero, Abdulhamid Aliyu Ardo, Imran Ghani, Mustapha Atiku

      [3] Classification of SQL injection detection and prevention measure.

      [4] Hussein Alnabulsi , Md Rafiqul Islam , Quazi Mamun

      [5] Detecting SQL injection using snort IDS

      [6] S. Eckmann, "Translating Snort rules to STATL scenarios", In Proc. Recent Advances in Intrusion Detection, pp. 1-13, October 2001

      [7] Tautology based Advanced SQL Injection Technique A Peril to Web Application

      [8] Kritarth Jhala Shukla Umang Chad Dougherty, “Practical identification of SQL injection vulnerabilitiesâ€

  • Downloads

  • How to Cite

    Sreeja, T., Manna Sheela Rani Chetty, D., & Babu Boddu, S. (2018). Detecting SQL Injection Using Correlative Log Analysis. International Journal of Engineering & Technology, 7(2.32), 389-392. https://doi.org/10.14419/ijet.v7i2.32.15720