Hybrid SQL injection detection system

Author(s):  
B. Deva Priyaa ◽  
M. Indra Devi
Kursor ◽  
2018 ◽  
Vol 9 (3) ◽  
Author(s):  
Rajif Agung Yunmar

SQL injection attacks toward web application increasingly prevalent. Testing to the web that will published is the one of preventive measures. However, this method sometimes ineffective because constrained by various things. Instrusion detection system (IDS) is able to help protect the website from various attacks. This study proposed an IDS for web applications from SQL injection-based attacks. The IDS is based on hybrid architecture with a signature-based detection method, type of data to analyzed is network packet and error log. The fuzzy logic inference engine used to be drawn the conclusion based on analyzed data. Proposed hybrid IDS has good result on detecting the various type of SQL injection attack and significantly reduce or even remove the false positive and false negative.


Author(s):  
Jothi K R ◽  
Saravana Balaji B ◽  
Nishant Pandey ◽  
Pradyumn Beriwal ◽  
Abhinandan Amarajan

Author(s):  
Resi Utami Putri ◽  
Jazi Eko Istiyanto

AbstrakForensik jaringan merupakan ilmu keamanan komputer berkaitan dengan investigasi untuk menemukan sumber serangan pada jaringan berdasarkan bukti log, mengidentifikasi, menganalisis serta merekonstruksi ulang kejadian tersebut. Penelitian forensik jaringan dilakukan di Pusat Pelayanan Teknologi Informasi dan Komunikasi (PPTIK) Universitas Gadjah Mada.Metode yang digunakan adalah model proses forensik (The Forensic Process Model) sebuah model proses investigasi forensik digital, yang terdiri dari tahap pengkoleksian, pemeriksaan, analisis dan pelaporan. Penelitian dilakukan selama lima bulan dengan mengambil data dari Intrusion Detection System (IDS) Snort. Beberapa file log digabungkan menjadi satu file log, lalu data dibersihkan agar sesuai untuk penelitian.Berdasarkan hasil penelitian yang telah dilakukan, terdapat 68 IP address  yang melakukan tindakan illegal SQL Injection pada server www.ugm.ac.id. Kebanyakan penyerang menggunakan tools SQL Injection yaitu Havij dan SQLMap sebagai tool otomatis untuk memanfaatkan celah keamanan pada suatu website. Selain itu, ada yang menggunakan skrip Python yaitu berasal dari benua Eropa yaitu di Romania. Kata kunci—forensik jaringan, model proses forensik, SQL injection AbstractNetwork forensic is a computer security investigation to find the sources of the attacks on the network by examining log evidences, identifying, analyzing and reconstructing the incidents. This research has been conducted at The Center of Information System and Communication Service, Gadjah Mada University.The method that used was The Forensic Process Model, a model of the digital investigation process, consisted of collection, examination, analysis, and reporting. This research has been conducted over five months by retrieving data that was collected from Snort Intrusion Detection System (IDS). Some log files were retrieved and merged into a single log file, and then the data cleaned to fit for research.Based on the research, there are 68 IP address was that did illegal action, SQL injection, on server www.ugm.ac.id. Most of attackers using Havij and SQLmap (automated tools to exploit vulnerabilities on a website). Beside that, there was also Python script that was derived from the continent of Europe in Romania. Keywords— Network Forensics, The Forensic Process Models, SQL Injection


2017 ◽  
Vol 9 (4) ◽  
pp. 62-71
Author(s):  
Alex Zhu ◽  
Wei Qi Yan

SQLIA is adopted to attack websites with and without confidential information. Hackers utilized the compromised website as intermediate proxy to attack others for avoiding being committed of cyber-criminal and also enlarging the scale of Distributed Denial of Service Attack (DDoS). The DDoS is that hackers maliciously turn down a website and make network resources unavailable to web users. It is extremely difficult to effectively detect and prevent SQLIA because hackers adopt various evading SQLIA Intrusion Detection System techniques. Victims may not be even aware of that their confidential data has been compromised for a long time. In this paper, our contribution is that we evaluate several most popular open source SQLIA tools and SQLIA prevention tools with both qualitative and quantitative assessments.


Author(s):  
J. B. Warren

Electron diffraction intensity profiles have been used extensively in studies of polycrystalline and amorphous thin films. In previous work, diffraction intensity profiles were quantitized either by mechanically scanning the photographic emulsion with a densitometer or by using deflection coils to scan the diffraction pattern over a stationary detector. Such methods tend to be slow, and the intensities must still be converted from analog to digital form for quantitative analysis. The Instrumentation Division at Brookhaven has designed and constructed a electron diffractometer, based on a silicon photodiode array, that overcomes these disadvantages. The instrument is compact (Fig. 1), can be used with any unmodified electron microscope, and acquires the data in a form immediately accessible by microcomputer.Major components include a RETICON 1024 element photodiode array for the de tector, an Analog Devices MAS-1202 analog digital converter and a Digital Equipment LSI 11/2 microcomputer. The photodiode array cannot detect high energy electrons without damage so an f/1.4 lens is used to focus the phosphor screen image of the diffraction pattern on to the photodiode array.


Sign in / Sign up

Export Citation Format

Share Document