Abstract
According to the SQL injection attack process with the characteristic of connection, a detecting method was presented based on connective signatures filter, suitable for the traditional signatures matching algorithm. Using multiple member signatures which described by regular expression to filter the packets of hosts from Intranet. The experiment proves the validity and practicability of the detecting method.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
OWASP held a Web security event and reading Web security trend, http://www.enet.com.cn/article/2010/0521/A20100521657157.shtml
Zhang, B.: SQL Injection Attack and Detection Technology. Information Security and Communications Privacy 5, 90–92 (2010)
Li, Y.-P.: The Implementation of SQL Injection Attacks Scanning Analysis Tool and Research on Prevention Technology. Beijing jiaotong University School of Computer and Information Technology, Beijing (2010)
Wang, W.-P., Li, C., Duan, G.-H.: Design of SQL Injection Filtering Module Based on Regular Expression. Computer Engineering 37, 158–160 (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag GmbH Berlin Heidelberg
About this chapter
Cite this chapter
Wang, H., Wang, J., Zhang, J., Lin, S., Xia, C. (2012). The Research of Detecting SQL Injection Based on the Connectivity with Its Behavior. In: Sambath, S., Zhu, E. (eds) Frontiers in Computer Education. Advances in Intelligent and Soft Computing, vol 133. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27552-4_68
Download citation
DOI: https://doi.org/10.1007/978-3-642-27552-4_68
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27551-7
Online ISBN: 978-3-642-27552-4
eBook Packages: EngineeringEngineering (R0)