SlideShare a Scribd company logo
1 of 13
SQL Security
Computation
Submitted By:
Saikat Saha (A2300911013)
Harsh Kumar Sarohi (A2300911018)
Submitted To:
Ms. Smriti Sehgal
CONTENT
Introduction to Security of Database
Architecture of the Security System
Attack Protection
Construction of Secure Rule Library
SQL Filtering
Workflow of SQL Filtration
Conclusion
INTRODUCTION
More and more applications based on Databases appeared.
SQL attacks draws the attention to the security of database
on the internet.
Many security schemes are proposed before like SQL injection
attack detection system, security proxy in front of the web
server etc.
But these only provide the one aspect of protection.
Proposal of deploying the security between Web Server and
Database Server.
ARCHITECTURE
There are six main modules:
 Authentication
 Transparent Proxy
 Attack Protection
 Connection Monitoring
 Service Configuration
 Audit
ARCHITECTURE
browsers
 Authentication: The authentication module inspects the
authority of users who access database.
 Transparent Proxy: It uses port mapping technology to work.
 Attack Protection: It detects and prevents various types of
attacks in real-time.
 Connection Monitoring: It monitors all connections to the
database and the flow of information of each connection in
real-time.
 Audit: It provides audit function which includes mandatory
audit and common audit.
 Service Configuration: It provides service configuration
management.
ATTACK PROTECTION
Attack protection module adopts network and database
protocol analysis to analyse received packets and uses pattern
matching algorithm to determine legality of SQL statements.
Database
protocol
analytic
Construction of Secure Rules
Library
Secure rules library is an attack characteristics library of the
module and very important. It has many rules and each rule is
an attack characteristic. System identifies attacks according to
the rules library. Each rule is divided into two parts: the rule
head and the rule option. The format of rule head is shown
below:
SQL Filtering
SQL filtering is one of core functions of system.
It compares SQL access of applications with predefined rules
of access, analyses SQL statements, matches with the
characteristics of intrusion, and takes warning or record.
According to each type of intrusion, system refines its
characteristic value and writes an inspection rule to form a
rule bank.
Receiving the SQL statement, SQL filtering module converts it
into data and its format can be identified, checks the
legitimacy of TCP and IP header, uses pattern-matching
algorithm to detect and analyse the data.
Workflow of SQL Filtration
CONCLUSION
To enhance security of database applications a transparent
database security gateway between web server and database
server is introduced.
References
• Deng Liwu, Xu Ruzhi, Jiang Lizheng, Lv Guangjuan, "A
Database Protection System Aiming at SQL Attack," Proc.
IEEE Conf. Information Assurance and Security(IAS 2009),
IEEE Press, Aug. 2009, pp. 655-657, doilO.lI09IIAS.2009.322.
• E. Bertino and R. Sandhu, "Database security-concepts,
approaches, and challenges,“ IEEE Trans. Dependable and
Secure Computing(TDSC 2005), vol.2, Jan.-Mar. 2005, pp.
2-19, doi:I0.11 09/TDSC2005.9.
THANK YOU

More Related Content

What's hot

IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...IEEEMEMTECHSTUDENTPROJECTS
 
Efficient Spring Data REST Development
Efficient Spring Data REST DevelopmentEfficient Spring Data REST Development
Efficient Spring Data REST DevelopmentCatalin Tudose
 
Mule security - jaas
Mule  security - jaasMule  security - jaas
Mule security - jaascharan teja R
 
Krazykoder struts2 intro
Krazykoder struts2 introKrazykoder struts2 intro
Krazykoder struts2 introKrazy Koder
 
Security Testing - A complete Guide
Security Testing - A complete GuideSecurity Testing - A complete Guide
Security Testing - A complete GuideBugRaptors
 
Sql Server Security
Sql Server SecuritySql Server Security
Sql Server SecurityVinod Kumar
 
Secure Code Warrior - Defense in depth
Secure Code Warrior - Defense in depthSecure Code Warrior - Defense in depth
Secure Code Warrior - Defense in depthSecure Code Warrior
 
J2 me based file transfer and storage system architecture
J2 me based file transfer and storage system   architectureJ2 me based file transfer and storage system   architecture
J2 me based file transfer and storage system architecturepenubarthhy
 

What's hot (18)

Mule security-jaas
Mule security-jaasMule security-jaas
Mule security-jaas
 
Sql
SqlSql
Sql
 
Websphere - Introduction to ssl part ii
Websphere - Introduction to  ssl part iiWebsphere - Introduction to  ssl part ii
Websphere - Introduction to ssl part ii
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...
 
Efficient Spring Data REST Development
Efficient Spring Data REST DevelopmentEfficient Spring Data REST Development
Efficient Spring Data REST Development
 
Owasp first5 presentation
Owasp first5 presentationOwasp first5 presentation
Owasp first5 presentation
 
Web Security
Web SecurityWeb Security
Web Security
 
Mule security - jaas
Mule  security - jaasMule  security - jaas
Mule security - jaas
 
Mule security - jaas
Mule  security - jaasMule  security - jaas
Mule security - jaas
 
Anypoint data gateway
Anypoint data gatewayAnypoint data gateway
Anypoint data gateway
 
Krazykoder struts2 intro
Krazykoder struts2 introKrazykoder struts2 intro
Krazykoder struts2 intro
 
Security Testing - A complete Guide
Security Testing - A complete GuideSecurity Testing - A complete Guide
Security Testing - A complete Guide
 
Sql Server Security
Sql Server SecuritySql Server Security
Sql Server Security
 
Secure Code Warrior - Defense in depth
Secure Code Warrior - Defense in depthSecure Code Warrior - Defense in depth
Secure Code Warrior - Defense in depth
 
Owasp top 10
Owasp top 10Owasp top 10
Owasp top 10
 
Owasp top 10 2017
Owasp top 10 2017Owasp top 10 2017
Owasp top 10 2017
 
OWASP -Top 5 Jagjit
OWASP -Top 5 JagjitOWASP -Top 5 Jagjit
OWASP -Top 5 Jagjit
 
J2 me based file transfer and storage system architecture
J2 me based file transfer and storage system   architectureJ2 me based file transfer and storage system   architecture
J2 me based file transfer and storage system architecture
 

Similar to Sql security

Devoid Web Application From SQL Injection Attack
Devoid Web Application From SQL Injection AttackDevoid Web Application From SQL Injection Attack
Devoid Web Application From SQL Injection AttackIJRESJOURNAL
 
A hybrid technique for sql injection attacks detection and prevention
A hybrid technique for sql injection attacks detection and preventionA hybrid technique for sql injection attacks detection and prevention
A hybrid technique for sql injection attacks detection and preventionijdms
 
GreenSQL Security
 GreenSQL Security GreenSQL Security
GreenSQL Securityijsrd.com
 
Prevention of SQL injection in E- Commerce
Prevention of SQL injection in E- CommercePrevention of SQL injection in E- Commerce
Prevention of SQL injection in E- Commerceijceronline
 
SQL Injection Prevention by Adaptive Algorithm
SQL Injection Prevention by Adaptive AlgorithmSQL Injection Prevention by Adaptive Algorithm
SQL Injection Prevention by Adaptive AlgorithmIOSR Journals
 
A Survey on Authorization Systems for Web Applications
A Survey on Authorization Systems for Web ApplicationsA Survey on Authorization Systems for Web Applications
A Survey on Authorization Systems for Web Applicationsiosrjce
 
SQL Injection and Clickjacking Attack in Web security
SQL Injection and Clickjacking Attack in Web securitySQL Injection and Clickjacking Attack in Web security
SQL Injection and Clickjacking Attack in Web securityMoutasm Tamimi
 
Prevention of SQL Injection Attacks having XML Database
Prevention of SQL Injection Attacks having XML DatabasePrevention of SQL Injection Attacks having XML Database
Prevention of SQL Injection Attacks having XML DatabaseIOSR Journals
 
IRJET- An Efficient Technique for Finding SQL Injection using Reverse Proxy S...
IRJET- An Efficient Technique for Finding SQL Injection using Reverse Proxy S...IRJET- An Efficient Technique for Finding SQL Injection using Reverse Proxy S...
IRJET- An Efficient Technique for Finding SQL Injection using Reverse Proxy S...IRJET Journal
 
Foundations of Cybersecurity's.pptx
Foundations of Cybersecurity's.pptxFoundations of Cybersecurity's.pptx
Foundations of Cybersecurity's.pptxSkillUp Online
 
Algorithm for Securing SOAP Based Web Services from WSDL Scanning Attacks
Algorithm for Securing SOAP Based Web Services from WSDL Scanning AttacksAlgorithm for Securing SOAP Based Web Services from WSDL Scanning Attacks
Algorithm for Securing SOAP Based Web Services from WSDL Scanning Attacksiosrjce
 
Asp net whitepaper
Asp net whitepaperAsp net whitepaper
Asp net whitepaperZayar Shwe
 
Deployment of Reverse Proxy for the Mitigation of SQL Injection Attacks Using...
Deployment of Reverse Proxy for the Mitigation of SQL Injection Attacks Using...Deployment of Reverse Proxy for the Mitigation of SQL Injection Attacks Using...
Deployment of Reverse Proxy for the Mitigation of SQL Injection Attacks Using...ijcisjournal
 
Deployment of Reverse Proxy for the Mitigation of SQL Injection Attacks Using...
Deployment of Reverse Proxy for the Mitigation of SQL Injection Attacks Using...Deployment of Reverse Proxy for the Mitigation of SQL Injection Attacks Using...
Deployment of Reverse Proxy for the Mitigation of SQL Injection Attacks Using...ijcisjournal
 

Similar to Sql security (20)

Devoid Web Application From SQL Injection Attack
Devoid Web Application From SQL Injection AttackDevoid Web Application From SQL Injection Attack
Devoid Web Application From SQL Injection Attack
 
Database security issues
Database security issuesDatabase security issues
Database security issues
 
A hybrid technique for sql injection attacks detection and prevention
A hybrid technique for sql injection attacks detection and preventionA hybrid technique for sql injection attacks detection and prevention
A hybrid technique for sql injection attacks detection and prevention
 
GreenSQL Security
 GreenSQL Security GreenSQL Security
GreenSQL Security
 
Prevention of SQL injection in E- Commerce
Prevention of SQL injection in E- CommercePrevention of SQL injection in E- Commerce
Prevention of SQL injection in E- Commerce
 
E017131924
E017131924E017131924
E017131924
 
SQL Injection Prevention by Adaptive Algorithm
SQL Injection Prevention by Adaptive AlgorithmSQL Injection Prevention by Adaptive Algorithm
SQL Injection Prevention by Adaptive Algorithm
 
A Survey on Authorization Systems for Web Applications
A Survey on Authorization Systems for Web ApplicationsA Survey on Authorization Systems for Web Applications
A Survey on Authorization Systems for Web Applications
 
A017310105
A017310105A017310105
A017310105
 
SQL INJECTION ATTACKS.pptx
SQL INJECTION ATTACKS.pptxSQL INJECTION ATTACKS.pptx
SQL INJECTION ATTACKS.pptx
 
SQL Injection and Clickjacking Attack in Web security
SQL Injection and Clickjacking Attack in Web securitySQL Injection and Clickjacking Attack in Web security
SQL Injection and Clickjacking Attack in Web security
 
Prevention of SQL Injection Attacks having XML Database
Prevention of SQL Injection Attacks having XML DatabasePrevention of SQL Injection Attacks having XML Database
Prevention of SQL Injection Attacks having XML Database
 
IRJET- An Efficient Technique for Finding SQL Injection using Reverse Proxy S...
IRJET- An Efficient Technique for Finding SQL Injection using Reverse Proxy S...IRJET- An Efficient Technique for Finding SQL Injection using Reverse Proxy S...
IRJET- An Efficient Technique for Finding SQL Injection using Reverse Proxy S...
 
Ld3420072014
Ld3420072014Ld3420072014
Ld3420072014
 
Foundations of Cybersecurity's.pptx
Foundations of Cybersecurity's.pptxFoundations of Cybersecurity's.pptx
Foundations of Cybersecurity's.pptx
 
F017353539
F017353539F017353539
F017353539
 
Algorithm for Securing SOAP Based Web Services from WSDL Scanning Attacks
Algorithm for Securing SOAP Based Web Services from WSDL Scanning AttacksAlgorithm for Securing SOAP Based Web Services from WSDL Scanning Attacks
Algorithm for Securing SOAP Based Web Services from WSDL Scanning Attacks
 
Asp net whitepaper
Asp net whitepaperAsp net whitepaper
Asp net whitepaper
 
Deployment of Reverse Proxy for the Mitigation of SQL Injection Attacks Using...
Deployment of Reverse Proxy for the Mitigation of SQL Injection Attacks Using...Deployment of Reverse Proxy for the Mitigation of SQL Injection Attacks Using...
Deployment of Reverse Proxy for the Mitigation of SQL Injection Attacks Using...
 
Deployment of Reverse Proxy for the Mitigation of SQL Injection Attacks Using...
Deployment of Reverse Proxy for the Mitigation of SQL Injection Attacks Using...Deployment of Reverse Proxy for the Mitigation of SQL Injection Attacks Using...
Deployment of Reverse Proxy for the Mitigation of SQL Injection Attacks Using...
 

Recently uploaded

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 

Recently uploaded (20)

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 

Sql security

  • 1. SQL Security Computation Submitted By: Saikat Saha (A2300911013) Harsh Kumar Sarohi (A2300911018) Submitted To: Ms. Smriti Sehgal
  • 2. CONTENT Introduction to Security of Database Architecture of the Security System Attack Protection Construction of Secure Rule Library SQL Filtering Workflow of SQL Filtration Conclusion
  • 3. INTRODUCTION More and more applications based on Databases appeared. SQL attacks draws the attention to the security of database on the internet. Many security schemes are proposed before like SQL injection attack detection system, security proxy in front of the web server etc. But these only provide the one aspect of protection. Proposal of deploying the security between Web Server and Database Server.
  • 4. ARCHITECTURE There are six main modules:  Authentication  Transparent Proxy  Attack Protection  Connection Monitoring  Service Configuration  Audit
  • 6.  Authentication: The authentication module inspects the authority of users who access database.  Transparent Proxy: It uses port mapping technology to work.  Attack Protection: It detects and prevents various types of attacks in real-time.  Connection Monitoring: It monitors all connections to the database and the flow of information of each connection in real-time.  Audit: It provides audit function which includes mandatory audit and common audit.  Service Configuration: It provides service configuration management.
  • 7. ATTACK PROTECTION Attack protection module adopts network and database protocol analysis to analyse received packets and uses pattern matching algorithm to determine legality of SQL statements. Database protocol analytic
  • 8. Construction of Secure Rules Library Secure rules library is an attack characteristics library of the module and very important. It has many rules and each rule is an attack characteristic. System identifies attacks according to the rules library. Each rule is divided into two parts: the rule head and the rule option. The format of rule head is shown below:
  • 9. SQL Filtering SQL filtering is one of core functions of system. It compares SQL access of applications with predefined rules of access, analyses SQL statements, matches with the characteristics of intrusion, and takes warning or record. According to each type of intrusion, system refines its characteristic value and writes an inspection rule to form a rule bank. Receiving the SQL statement, SQL filtering module converts it into data and its format can be identified, checks the legitimacy of TCP and IP header, uses pattern-matching algorithm to detect and analyse the data.
  • 10. Workflow of SQL Filtration
  • 11. CONCLUSION To enhance security of database applications a transparent database security gateway between web server and database server is introduced.
  • 12. References • Deng Liwu, Xu Ruzhi, Jiang Lizheng, Lv Guangjuan, "A Database Protection System Aiming at SQL Attack," Proc. IEEE Conf. Information Assurance and Security(IAS 2009), IEEE Press, Aug. 2009, pp. 655-657, doilO.lI09IIAS.2009.322. • E. Bertino and R. Sandhu, "Database security-concepts, approaches, and challenges,“ IEEE Trans. Dependable and Secure Computing(TDSC 2005), vol.2, Jan.-Mar. 2005, pp. 2-19, doi:I0.11 09/TDSC2005.9.

Editor's Notes

  1. IP address, user name, database name, schema name, tables, views are combined as an authorization object. Some "IP + User" objects are authorized to access the database fully. Shields IP address and port of real database server. When the user's operations have attack codes, system can identify them in real time and automatically cut off the connection to prevent successful attack. alarms if exceeded authority accesses or attacks and keeps logs. Mandatory audit records important events, such as database connections, unauthorized access, IP addresses of exceeded authority access, attacks. Common audit includes the audit of all SQL statements
  2. Data packet capture module monitors network and captures packets, then send them to network protocol analysis module. Network protocol analysis module extracts and regroups the data from these packets according to TCP / IP protocol. Data are sent to database protocol analysis module. Database protocol analysis module extracts SQL statements and sends them to SQL filtering module. SQL filtering module adopts matching algorithm to compare them with rules in rules library to determine whether there has an intrusion. Response module takes measures to identified intrusion. This system's response is to cut off the intruder's TCP connection. But in most commercial implementations, they combine intrusion detection system with routers or firewalls to implement response.
  3. Action section shows that if the rule and SQL packet are compared to meet the condition, what type of action will be taken. Generally, Action is to generate alerts, record logs, cut off the TCP connection or send requests to other rules. Protocol section shows the protocol used by SQL packet. The system only supports TCP protocol. Address section specifies the addresses of source or destination. Address can be a host, a number of host addresses or network addresses. There are two address sections in the rule, and which is source and the other is destination depend on the direction section. Port section specifies the source or destination port of packet. Direction section uses "->"or "<-" to specify which side is source address or port and which is destination.
  4. The gateway has been deployed in electrical secondary system. The loss of speed of accessing database is less than 10%, which complies with system requirement.