Sql injection detecting method based on characteristic pattern recognition

A feature pattern and detection method technology, applied in the field of network security, can solve problems such as inaccurate distinction between grammatical units and data, false positives, etc., to achieve the effect of reducing false negatives, reducing false positives, and improving work efficiency

Inactive Publication Date: 2017-12-08
杭州美创科技股份有限公司
View PDF2 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to overcome the lack of correct identification of grammatical units and data in the statement that may lead to false positives caused by the recognition method using lexical analysis in the prior art, and to provide a sql injection detection based on feature pattern recognition method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sql injection detecting method based on characteristic pattern recognition

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0027] figure 1 A kind of sql injection detection method based on feature pattern recognition of the present embodiment comprises the following steps:

[0028] 1. Based on sql syntax analysis and sql semantic analysis, generate sql injection characteristic mode abstract syntax tree library:

[0029] After preventive parsing, the following grammatical elements are obtained:

[0030] A. Keywords, reserved keywords of sql statements such as select, from, etc.

[0031] B. Constants, constant values ​​in sql statements such as character constant 'aa', numeric constant 123, etc.

[0032] C. Variables, variables used in sql statements such as bind variables.

[0033] D. Identifiers, identifiers in sql statements such as table names, field names, etc.

[0034] E. Data type, the data type of the object in the sql statement, such as character type, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an sql injection detecting method based on characteristic pattern recognition. The method comprises the following steps that (1-1) based on sql parsing and sql semantic analysis, an abstract syntax tree database of sql injection characteristic patterns is generated; (1-2) network traffic from an application program to a database is acquired, the network traffic is analyzed based on a database protocol, and complete sql sentences are extracted from the network traffic; (1-3) sql sentence parsing is conducted on the acquired sql sentences, and syntactic units of the sql sentences are acquired; (1-4) sql semantic analysis is conducted on the syntactic units of the sql sentences, semantic calculation is carried out, and a target abstract syntax tree simplified by calculation is generated. The sql injection detecting method has the advantages that false or missing reports are reduced and the working efficiency is improved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a sql injection detection method based on characteristic pattern recognition. Background technique [0002] Sql injection is to insert sql commands into the user input of the application to affect the query string, and finally trick the server into executing malicious sql commands. [0003] SQL injection attacks occur when an application uses user input to dynamically construct SQL statements to access a database. When many applications are written, there is no legal filtering or incomplete filtering of the content input by the user, which makes the application program have a security risk of SQL injection. The attacker obtains sensitive information through sql injection, destroys application data, and even controls the entire server. [0004] Defects of existing sql injection attack identification schemes: 1. They are all aimed at web applications and cannot provide s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55H04L29/06
CPCG06F21/554H04L63/1416
Inventor 陈建培闻建霞柳遵梁
Owner 杭州美创科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products