Effective SQL injection attack reconstruction using network recording

Allen Pomeroy, Qing Tan

Research output: Chapter in Book/Report/Conference proceedingPublished Conference contributionpeer-review

11 Citations (Scopus)

Abstract

Web applications offer business and convenience services that society has become dependent on, such as online banking. Success of these applications is dependent on end user trust, although these services have serious weaknesses that can be exploited by attackers. Application owners must take additional steps to ensure the security of customer data and integrity of the applications, since web applications are under siege from cyber criminals seeking to steal confidential information and disable or damage the services offered by these applications. Successful attacks have lead to some organizations experiencing financial difficulties or even being forced out of business. Organizations have insufficient tools to detect and respond to attacks on web applications, since traditional security logs have gaps that make attack reconstruction nearly impossible. This paper explores network recording challenges, benefits and possible future use. A network recording solution is proposed to detect and capture SQL injection attacks, resulting in the ability to successfully reconstruct SQL injection attacks in order to maintain application integrity.

Original languageEnglish
Title of host publicationProceedings - 11th IEEE International Conference on Computer and Information Technology, CIT 2011
Pages552-556
Number of pages5
DOIs
Publication statusPublished - 2011
Event11th IEEE International Conference on Computer and Information Technology, CIT 2011 and 11th IEEE International Conference on Scalable Computing and Communications, SCALCOM 2011 - Pafos, Cyprus
Duration: 31 Aug. 20112 Sep. 2011

Publication series

NameProceedings - 11th IEEE International Conference on Computer and Information Technology, CIT 2011

Conference

Conference11th IEEE International Conference on Computer and Information Technology, CIT 2011 and 11th IEEE International Conference on Scalable Computing and Communications, SCALCOM 2011
Country/TerritoryCyprus
CityPafos
Period31/08/112/09/11

Keywords

  • Bro-IDS
  • Digital evidence
  • Intrusion detection
  • Network recording
  • SQL injection attacks
  • Time machine

Fingerprint

Dive into the research topics of 'Effective SQL injection attack reconstruction using network recording'. Together they form a unique fingerprint.

Cite this