A database proxy device for defending against sql injection attacks

An injection attack and proxy device technology, applied in the field of network security, can solve problems such as affecting normal user use, high blacklist false positives, etc., to achieve the effect of improving security, defending against SQL injection attacks, and defending against attack behaviors

Active Publication Date: 2021-01-01
SHANGHAI REDNEURONS +1
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This solution has serious problems in the following two aspects: 1) It cannot do anything about unknown injection vulnerabilities; 2) Too many blacklists will cause high false positives, which will affect normal user use
[0006] detection system supporting multiple database types" discloses a SQL injection attack detection system that supports multiple types of databases, which includes multiple SQL injection attack detection modules with different syntax rules to filter and check the parameters submitted by users, so this solution is also a A defense method based on known attack behavior characteristics, which is ineffective against SQL injection attacks with unknown characteristics

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A database proxy device for defending against sql injection attacks
  • A database proxy device for defending against sql injection attacks
  • A database proxy device for defending against sql injection attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The present invention will be described in detail below in conjunction with specific embodiments. The following examples will help those skilled in the art to further understand the present invention, but do not limit the present invention in any form. It should be noted that those skilled in the art can make several modifications and improvements without departing from the concept of the present invention. These all belong to the protection scope of the present invention.

[0025] The database proxy device for defending against SQL injection attacks provided by the present invention is as follows: figure 1 As shown, it includes a statement receiving module, a label processing module, a statement grouping module, an injection attack detection module and One-statement execution module.

[0026] In the present invention, the sentence receiving module includes 2n+1 (shown as 3 in the figure) listening ports, and these listening ports are respectively connected to the ap...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a database agent apparatus for defending SQL injection attacks. The apparatus comprises a statement receiving module, a tag processing module, a statement grouping module, an injection attack detection module and a statement execution module. The statement receiving module receives an SQL statement forwarded by each application server. The tag processing module detects whether a tag in each statement is legal or not; and if yes, the tag in the statement is removed, otherwise, the statement is discarded. The statement grouping module divides the statements with the same contents in the statements subjected to tag removal into a group. The injection attack detection module detects whether the number of the statements in each group is equal to 2n+1 or n+1; if the number of the statements in each group is equal to 2n+1, the statements in the group are output; if the number of the statements in each group is equal to n+1 but is less than 2n+1, an alarm is given while the statements in the group are output; and if the number of the statements in each group is less than n+1, the statements in the group are discarded and the alarm is given. The statement execution module sends the received statements to a database server. The apparatus can defend unknown attack behaviors to realize high security and high reliability of a database.

Description

technical field [0001] The invention relates to the field of network security, and more specifically, relates to a database proxy device for defending against SQL injection attacks. Background technique [0002] In today's network environment, as an important storage tool, databases often store a large amount of valuable data, including user information, corporate data, financial finance, business secrets, intellectual property rights, customer order information, etc. It goes without saying. Therefore, databases often become the main target of network hackers. Network hackers use various ways, various attack tools, and various deceptive means to obtain the information they want. Therefore, it is very important to ensure the security of the database. [0003] The most common database security threat is SQL injection attack. SQL injection attack refers to passing special input statements into the web application server, and most of these inputs are some combinations of SQL s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/55
CPCG06F21/552G06F21/554
Inventor 张铮罗兴国邬江兴苏昆仑马博林庞建民谢光伟
Owner SHANGHAI REDNEURONS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products