Php-based independent sql injection defense analysis alarm method and system thereof

An alarm system, an independent technology, applied in the transmission system, electrical components, etc., can solve the problem that it is difficult to establish normal SQL statements and SQL injection attacks, cannot provide very effective protection, high false alarm rate and false negative rate, etc. problem, to achieve the effect of increasing cost, good scalability, and data protection

Inactive Publication Date: 2019-11-19
GUANGDONG EFLYCLOUD COMPUTING CO LTD
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

SQL injection attack is the most commonly used attack method when hackers attack web servers, which poses a serious threat to Internet security
[0003] In the prior art, most of the SQL injection attack defense methods are rule-based, that is, the judgment rules for distinguishing normal SQL statements and SQL injection attacks are established in advance. Due to the continuous development and evolution of attack methods, coupled with the amount of data on the Internet Too large and too diverse, it is difficult to establish a complete rule base that can accurately distinguish between normal SQL statements and SQL injection attacks, so this type of method often has a high false positive rate and false negative rate, and needs to be constantly Update the rule base but still can not play a very effective protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Php-based independent sql injection defense analysis alarm method and system thereof
  • Php-based independent sql injection defense analysis alarm method and system thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] There are four problems addressed by the present invention: the first is the defense problem of sql injection; the second is the analysis and processing problem of sql injection attack; Knowing that the server has been attacked; the fourth solution is the low cost of sql injection and frequent attacks.

[0036] The proposal of the present invention aims at the above four problems, and designs a set of independent prevention system based on php.

[0037] To solve the first problem, this solution uses the first layer of blacklist get, post, and cookie parameter judgment and filtering, mainly filtering some commonly used injection punctuation marks, the second layer monitors sql injection keywords, and the third layer is Sentence analysis of parameters to avoid misjudgment.

[0038] For the second question, the parameters will be judged. If there is a problem with the first layer and the rest are OK, the rating will be notice. If the first and second layers have injected ...

Embodiment 2

[0049] Such as figure 2 As shown, this embodiment provides a php-based independent sql injection defense analysis alarm system, including:

[0050] Banned IP blacklist collection unit, used to collect banned IPs for sql injection;

[0051] Banning the IP blacklist storage unit, used to store the collected banned IPs of sql injection;

[0052] Forbidden IP blacklist judging unit, is used for judging the request IP of sql injection, judges whether it is the banned IP in the described banned IP blacklist storage unit;

[0053] The blacklist symbol collection unit is used to collect blacklist symbols for sql injection;

[0054] The blacklist symbol storage unit is used to store the collected blacklist symbols of sql injection;

[0055] A blacklist symbol judging unit is used to judge the parameters of sql injection, whether the judgment parameter includes the blacklist symbol in the blacklist symbol storage unit, and the sql injection that includes the blacklist symbol is set ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a php-based independent sql injection defense analysis alarm method and a system thereof, and the method comprises the steps: checking whether a request IP is a forbidden IP blacklist, ending the request if the request IP is the forbidden IP blacklist, and entering the next step if the request IP is not the forbidden IP blacklist; judging whether parameters of sql injectioncontain blacklist symbols, and if yes, setting the sql injection as a note level; judging whether parameters of sql injection contain blacklist keywords, and if yes, setting the sql injection as a winning level; dividing the parameters of the sql injection by taking a space as a criterion, judging whether the parameters contain blacklist keywords, and if yes, setting the sql injection as an errorlevel; and performing sql injection on the error level, checking whether the request ip injected by the sql is subjected to injection attacks for a specified number of times, and if yes, forbidding the request ip and listing the request ip into a forbidden IP blacklist. According to the method, measures are taken for the sql injection problem in an omnibearing manner, corresponding measures are taken for prevention, response, monitoring and recording, and the data security is protected to a greater extent.

Description

technical field [0001] The invention relates to the technical field of SQL injection attacks, in particular to a PHP-based independent SQL injection defense analysis alarm method and a system thereof. Background technique [0002] With the rapid development of Internet technology, Web technology and database technology have become the key technologies of modern information system. Information security based on Web server and database is one of the core Internet security issues. For web servers and databases, they are extremely vulnerable to hackers. Among them, SQL injection attack is a common type of attack faced by web servers at present. The attacker inserts a series of SQL commands by modifying the input field of the web form of the application program or the query string in the page request to change the database query statement. Thereby deceiving the database server to execute malicious SQL commands, thereby realizing unauthorized access to the background database and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1466
Inventor 霍键聪陈美任史伟
Owner GUANGDONG EFLYCLOUD COMPUTING CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products