Unlock instant, AI-driven research and patent intelligence for your innovation.

Detection and protection system for SQL injection attacks

A technology that injects attacks and protection systems. It is used in transmission systems, digital data protection, and platform integrity maintenance. It can solve problems affecting network protection effects.

Inactive Publication Date: 2018-11-06
LUOHE POWER SUPPLY OF HENAN ELECTRIC POWER CORP
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this utility model cannot analyze the SQL injection attack to further determine the type and purpose of the attack, thus affecting the network protection effect

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Detection and protection system for SQL injection attacks
  • Detection and protection system for SQL injection attacks
  • Detection and protection system for SQL injection attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] like figure 1 As shown, a detection and protection system for SQL injection attacks includes an analysis module 2 interconnected with a switch 1 signal, a firewall 3 interconnected with the switch 1 signal, and a linkage connected between the analysis module 2 and the firewall 3 Module 4, the linkage module 4 and the analysis module 2 are interconnected through the first interface component 5, and the linkage module 4 and the firewall 3 are interconnected through the second interface component 6. The analysis module 2 is used for The data packets containing SQL injection attacks in the network are analyzed and alarmed, and the linkage module 4 is configured to issue a control policy to the firewall 3 and block the attacks when the analysis module 2 finds SQL injection attacks.

[0038] The analysis module 2 includes a mirror port 21 arranged on the switch 1, and a packet capture analysis unit 22 connected to the mirror port 21 and matched with the uplink port of the swi...

Embodiment 2

[0044] like figure 2 As shown, a detection and protection system for SQL injection attacks includes an analysis module 2 interconnected with a switch 1 signal, a firewall 3 interconnected with the switch 1 signal, and a linkage connected between the analysis module 2 and the firewall 3 Module 4, the linkage module 4 and the analysis module 2 are interconnected through the first interface component 5, and the linkage module 4 and the firewall 3 are interconnected through the second interface component 6. The analysis module 2 is used for The data packets containing SQL injection attacks in the network are analyzed and alarmed, and the linkage module 4 is configured to issue a control policy to the firewall 3 and block the attacks when the analysis module 2 finds SQL injection attacks.

[0045] The analysis module 2 includes a mirror port 21 arranged on the switch 1, and a packet capture analysis unit 22 connected to the mirror port 21 and matched with the uplink port of the sw...

Embodiment 3

[0053] like image 3 and Figure 4 As shown, the difference between it and Example 2 is:

[0054] A first authentication unit 9 is provided between the firewall 3 and the switch 1. The first authentication unit 9 includes a MAC address verification module 91 and an IP address verification module 92, and the MAC address verification module 91 is used to verify the access. Whether the computer has a trusted MAC address, the IP address verification module 92 is used to verify whether the connected computer has a trusted IP address.

[0055] In this embodiment, in order to avoid security threats caused by accessing data without a trusted MAC address and IP address, a first authentication unit is set between the firewall and the switch, and the first authentication unit includes a MAC address verification module and an IP address. Authentication module.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a detection and protection system for SQL injection attacks. The system comprises an analysis module that is in signal interconnection with a switch, a firewall that is in signal interconnection with the switch, and a linkage module connected between the analysis module and the firewall, wherein the linkage module and the analysis module are in signal interconnection through a first interface component, the linkage module and the firewall are in signal interconnection through a second interface component, the analysis module is used for analyzing and warning data packets containing SQL injection attacks in a network, and the linkage module is used for sending control strategies to the firewall and blocking the attacks when the analysis module finds the existence ofthe SQL injection attacks. According to the scheme of the invention, the effective detection of the SQL injection attacks can be achieved, and meanwhile, the system can effectively prevent hacker attacks through the linkage control with the firewall, and thus the network security can be guaranteed.

Description

technical field [0001] The invention relates to the technical field of communication security protection, in particular to a detection and protection system for SQL injection attacks. Background technique [0002] SQL injection attack is one of the common methods used by hackers to attack databases. With the development of B / S mode application development, more and more programmers use this mode to write application programs. However, because the level and experience of programmers are also uneven, a considerable number of programmers do not judge the legitimacy of user input data when writing code, which makes the application program have security risks. The user can submit a database query code, and obtain some data he wants to know according to the results returned by the program. This is the so-called SQL Injection, that is, SQL injection. [0003] Since SQL injection is accessed from a normal web port, it seems that it is no different from accessing web pages under no...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/55G06F21/57G06F21/62
CPCG06F21/554G06F21/577G06F21/6227H04L63/02H04L63/1425H04L63/168
Inventor 王建军韩源姚艳霞陈瑜胡丹赵欣慧赵永浩李亮伦迪王金科冀振鑫
Owner LUOHE POWER SUPPLY OF HENAN ELECTRIC POWER CORP