SlideShare a Scribd company logo
IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 4, 2013 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 877
Abstract— In today's modern world, security is a necessary
fact of life. GreenSQL Security helps small to large
organizations protect their sensitive information against
internal and external threats. The rule-based engine offers
database firewall, intrusion detection and prevention
(IDS/IPS). GreenSQL Security Engine applies exception
detection to prevent hacker attacks, end-user intrusion and
unauthorized access by privileged insiders. The system
provides a web based intuitive and flexible policy
framework that enables users to create and edit their security
rules quickly and easily. GreenSQL interfaces between your
database and any source requiring a connection to it. This
approach shields your database application and database
operating system from direct, remote access.
GreenSQL Database Security
1) Stops SQL Injection attacks on your web
application
2) Blocks unauthorized database access and alerts you
in real time about unwanted access
3) Separates your application database access
privileges from administrator access
4) Gives you a complete event log for investigating
database traffic and access
5) Ensures you achieve successful implementation
with 24/7 support
Keywords: SQL injection, web architecture, SQL tautology,
IDS (intrusion detection), IPS (intrusion prevention )
I. SQL INJECTION
SQL injection is a code injection technique that exploits a
security vulnerability occurring in the database layer of an
application.
The vulnerability is present when user input is
either incorrectly filtered for string literal escape characters
embedded in SQL statements or user input is not strongly
typed and thereby unexpectedly executed.
It is an instance of a more general class of
vulnerabilities that can occur whenever one programming or
scripting language is embedded inside another.
SQL injection is a basic attack used to either gain
unauthorized access to database or to retrieve information
directly from the database.
SQL injection is a technique used to take
advantage of no validated input vulnerabilities to pass SQL
commands through a web application for execution by a
backend database. SQL commands are injected from the
web form into the databse of an application to change the
databse content or dump the database information like
creditcard or password to attacker.
Most web applications include a back-end
database, either running on a separate database server, or
installed on the same machine as the web server itself. SQL
Injection is one of the most common application layer attack
techniques used today[1].
A. Web Application Architecture
Web application commonly has three tiers: presentation,
logic, and storage.
The presentation tier is the topmost level of the
application. It displays information related to such services
as browsing merchandise, purchasing, and shopping cart
contents, and it communicates with other tiers by outputting
results to the browser/client tier and all other tiers in the
network. [2]
The logic tier is pulled out from the presentation
tier, and as its own layer, it controls an application’s
functionality by performing detailed processing.
The data tier consists of database servers. Here,
information is stored and retrieved. This tier keeps data
independent from application servers or business logic.
Fig.1: Web Application Architecture
Giving data its own tier also improves scalability and
performance. In this Figure, the Web browser (presentation)
sends requests to the middle tier (logic), which services
GreenSQL Security
Jaydeep K. Dabhi1
Ass. Prof. Tarun K. Sureja2
1
M.E. CE (I.T. Systems & Network Security) 2
M. Tech (CSE)
1
AVPTI, Rajkot, Gujarat Technological University 2
NIT, Rourkela
S.P.B.Patel Engineering College, Mehsana, Gujarat
GreenSQL Security
(IJSRD/Vol. 1/Issue 4/2013/0018)
All rights reserved by www.ijsrd.com 878
them by making queries and updates against the database
(storage).
A fundamental rule in three-tier architecture is that
the presentation tier never communicates directly with the
data tier; in a three-tier model, all communication must pass
through the middleware tier.
In this Figure, the user fires up his Web browser
and connect to http://www.victim.com. The Web server that
resides in the logic tier loads the script from the file system
and passes it through its scripting engine, where it is parsed
and executed.
The script opens a connection to the storage tier
using a database connector and executes an SQL statement
against the database.
The database returns the data to the database
connector, which is passed to the scripting engine within the
logic tier.
The logic tier then implements any application or
business logic rules before returning a Web page in HTML
format to the user’s Web browser within the presentation
tier.
The user’s Web browser renders the HTML and
presents the user with a graphical representation of the code.
[4]
B. GreenSQL
GreenSQL database firewall used to protect databases from
SQL injection attacks.
GreenSQL works as a proxy for SQL commands
and has built in support for MySQL & PostgreSQL.
GreenSQL secure database from unauthorized
access by monitoring every SQL command sent to the
databases. GreenSQL helps business secure their
information assets and demonstrate regulatory compliances.
The logic is based on evaluation of SQL
commands using a risk scoring matrix as well as blocking
known db Administrative commands (DROP, CREATE,
etch). GreenSQL is distributed under the GPL license.
C. Calculating a query's risk
GreenSQL calculates each query's risk. Essentially, this is
an anomaly detection subsystem. After the risk is calculated,
GreenSQL can block the query or just create a warning
message (this depends on the application mode). There are a
number of heuristics GreenSQL uses when calculating risk
[6]
For example, query risk is increased by:
1) Fingerprinting of Database (users, accounts, credit
information)
2) Stack Based Query (Comments inside SQL
commands)
3) An SQL expression that always returns true (SQL
tautology)[10]
II. SQL TAUTOLOGY
This type of attack injects SQL tokens to the conditional
query statement to be evaluated always true. This type of
attack used to bypass authentication control and access to
data by exploiting vulnerable input field which use WHERE
clause.
"SELECT * FROM employee WHERE userid = '112' and
password ='aaa' OR '1 '='1 III
As the tautology statement (1=1) has been added to the
query statement so it is always true.[11]
III. MODES OF GREENSQL
The GreenSQL db firewall can be used in a number of
ways:[7][8][9]
1) IDS
2) IPS
3) Learning mode
4) Database firewall
A. IDS Mode
During Simulation Mode basically nothing is blocked.
GreenSQL works as a database IDS system (IDS stands for
Intrusion Detection System).During this mode, our risk
scoring matrix engine identifies suspicious queries and
notifies the database administrator using the GreenSQL
Management Console.
B. IPS Mode
When the system is configured to Block Suspicious
Commands, GreenSQL uses its heuristics engine to find
"illegal" queries and block them automatically. In this
mode, GreenSQL is basically a database IPS system (IPS is
Intrusion Prevention System). If a query is considered
illegal, a whitelist is checked. If it is found in the whitelist,
it will be redirected to the genuine MySQL server. If it is
found to be "illegal", GreenSQL will return an empty result
set to THE application. During this mode, GreenSQL can
sometimes generate false positive and false negative errors.
As a result, some legal queries may be blocked or the
GreenSQL system may pass through an "illegal" query
undetected. These are the pros and cons of IPS systems.
GreenSQL is constantly improving its heuristics engine but
it is still not perfect.
C. Learning Mode
The above methods we recommend enabling Learning
Mode and then, after the learning period is over, switching
to the Active protection from unknown queries.
During the learning mode, all queries are
automatically added to the whitelist. When the learning
mode is over, GreenSQL automatically enables active
protection.
D. Database Firewall Mode
When Active protection from unknown queries mode is
enabled, all unknown commands are blocked. This is
database firewall mode. When an unknown SQL command
is detected, it is automatically blocked.
GreenSQL Security
(IJSRD/Vol. 1/Issue 4/2013/0018)
All rights reserved by www.ijsrd.com 879
IV. GREENSQL ARCHITECTURE
GreenSQL works as a reverse proxy for MySQL
connections. This means, that instead of connecting TO
THE MySQL server, your applications will connect to THE
GreenSQL server. [9]
GreenSQL will analyze SQL queries and then, if
they're safe, will forward them to the back-end MySQL
server.
The following picture describes the whole process. [12][7]
Fig 2: GreenSQL Architecture
As you can see, GreenSQL calls the real database server to
execute SQL commands and the web application connects
to the GreenSQL server as if it were a real database server.
GreenSQL can be installed together with the
database server on the same computer or it can use a distinct
server. By default GreenSQL listens on local port
127.0.0.1:3305 redirecting SQL requests to 127.0.0.1:3306
(the default MySQL setting). These settings can be altered
using the GreenSQL Console.
V. CONCLUSION
1) Provides great security regarding different sql attacks.
2) Can be used as a penetration tool!!!
REFERENCES
[1] Justin Clarke, SQL Injection Attacks and Defense,
Second Edition, Syngress Publication, July 2,
2012,ISBN-13: 978-1597494243
[2] GreenSQL Available: http://www.greensql.net/
[3] GreenSQL Available:
http://www.howtoforge.com/preventing-mysql-
injection-attacks-with-greensql-on-debian-etch
[4] GreenSQL Available: http://www.greensql.com/docs
[5] GreenSQL Available:
http://www.greensql.com/support/knowledge
[6] GreenSQL Available: http://www.greensql.com/why-
greensql-db-security/top-10-reasons
[7] GreenSQL Available:
http://community.spiceworks.com/topic/212598-
database-firewall-greensql
[8] GreenSQL Available:
http://www.techrepublic.com/blog/opensource/firewall-
mysql-with-greensql/317
[9] GreenSQL Available:
http://opensourcedba.wordpress.com/2012/03/26/databas
e-firewalls-from-oracle-and-greensql/

More Related Content

What's hot

Towards secure and dependable storage
Towards secure and dependable storageTowards secure and dependable storage
Towards secure and dependable storage
Khaja Moiz Uddin
 
Sensitive Data Protection in DBaaS
Sensitive Data Protection in DBaaSSensitive Data Protection in DBaaS
Sensitive Data Protection in DBaaS
KAMLESH HINGWE
 
Ensuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the CloudEnsuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the Cloud
Suraj Mehta
 
cloud computing preservity
cloud computing preservitycloud computing preservity
cloud computing preservity
chennuruvishnu
 
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET Journal
 
Owasp Backend Security Project 1.0beta
Owasp Backend Security Project 1.0betaOwasp Backend Security Project 1.0beta
Owasp Backend Security Project 1.0beta
Security Date
 
Sql injection
Sql injectionSql injection
Sql injection
Pallavi Biswas
 
Ensuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloudEnsuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloud
Sathya Moorthy
 
Sql injection
Sql injectionSql injection
Sql injection
Zidh
 
Cloud Storage and Security
Cloud Storage and SecurityCloud Storage and Security
Cloud Storage and Security
Shashank Srivastava
 
Overview of cloud computing architecture service
Overview of cloud computing architecture serviceOverview of cloud computing architecture service
Overview of cloud computing architecture service
eSAT Publishing House
 
Overview of cloud computing architecture
Overview of cloud computing architectureOverview of cloud computing architecture
Overview of cloud computing architecture
eSAT Journals
 
Ijarcet vol-2-issue-3-942-946
Ijarcet vol-2-issue-3-942-946Ijarcet vol-2-issue-3-942-946
Ijarcet vol-2-issue-3-942-946
Editor IJARCET
 
Sql injection & command injection
Sql injection & command injectionSql injection & command injection
Sql injection & command injection
Lahore Garrison University
 
Ensuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the CloudEnsuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the Cloud
Suraj Mehta
 
Sql
SqlSql
Sql
IJASCSE
 
Attribute based encryption with privacy preserving in clouds
Attribute based encryption with privacy preserving in cloudsAttribute based encryption with privacy preserving in clouds
Attribute based encryption with privacy preserving in clouds
Swathi Rampur
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
IRJET Journal
 
Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloudOruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud
Nexgen Technology
 
Ensuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloudEnsuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloud
Gowthami Konakanchi
 

What's hot (20)

Towards secure and dependable storage
Towards secure and dependable storageTowards secure and dependable storage
Towards secure and dependable storage
 
Sensitive Data Protection in DBaaS
Sensitive Data Protection in DBaaSSensitive Data Protection in DBaaS
Sensitive Data Protection in DBaaS
 
Ensuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the CloudEnsuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the Cloud
 
cloud computing preservity
cloud computing preservitycloud computing preservity
cloud computing preservity
 
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
 
Owasp Backend Security Project 1.0beta
Owasp Backend Security Project 1.0betaOwasp Backend Security Project 1.0beta
Owasp Backend Security Project 1.0beta
 
Sql injection
Sql injectionSql injection
Sql injection
 
Ensuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloudEnsuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloud
 
Sql injection
Sql injectionSql injection
Sql injection
 
Cloud Storage and Security
Cloud Storage and SecurityCloud Storage and Security
Cloud Storage and Security
 
Overview of cloud computing architecture service
Overview of cloud computing architecture serviceOverview of cloud computing architecture service
Overview of cloud computing architecture service
 
Overview of cloud computing architecture
Overview of cloud computing architectureOverview of cloud computing architecture
Overview of cloud computing architecture
 
Ijarcet vol-2-issue-3-942-946
Ijarcet vol-2-issue-3-942-946Ijarcet vol-2-issue-3-942-946
Ijarcet vol-2-issue-3-942-946
 
Sql injection & command injection
Sql injection & command injectionSql injection & command injection
Sql injection & command injection
 
Ensuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the CloudEnsuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the Cloud
 
Sql
SqlSql
Sql
 
Attribute based encryption with privacy preserving in clouds
Attribute based encryption with privacy preserving in cloudsAttribute based encryption with privacy preserving in clouds
Attribute based encryption with privacy preserving in clouds
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloudOruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud
 
Ensuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloudEnsuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloud
 

Viewers also liked

Handwritten Script Recognition
Handwritten Script RecognitionHandwritten Script Recognition
Handwritten Script Recognition
ijsrd.com
 
Process parameter optimization of SLM process and application of Taguchi appr...
Process parameter optimization of SLM process and application of Taguchi appr...Process parameter optimization of SLM process and application of Taguchi appr...
Process parameter optimization of SLM process and application of Taguchi appr...
ijsrd.com
 
Waste Minimization and Cost Reduction in Process Industries
Waste Minimization and Cost Reduction in Process IndustriesWaste Minimization and Cost Reduction in Process Industries
Waste Minimization and Cost Reduction in Process Industries
ijsrd.com
 
Exhaust analysis of four stroke single cylinder diesel engine using copper ba...
Exhaust analysis of four stroke single cylinder diesel engine using copper ba...Exhaust analysis of four stroke single cylinder diesel engine using copper ba...
Exhaust analysis of four stroke single cylinder diesel engine using copper ba...
ijsrd.com
 
Analysis of Parking Demand and Suggesting Alternative for Parking (A Case Stu...
Analysis of Parking Demand and Suggesting Alternative for Parking (A Case Stu...Analysis of Parking Demand and Suggesting Alternative for Parking (A Case Stu...
Analysis of Parking Demand and Suggesting Alternative for Parking (A Case Stu...
ijsrd.com
 
Wireless Sensor Network: Topology Issues
Wireless Sensor Network: Topology IssuesWireless Sensor Network: Topology Issues
Wireless Sensor Network: Topology Issues
ijsrd.com
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
ijsrd.com
 
Analysis of SEPIC for PV-Applications using PI Controller and Current Mode Co...
Analysis of SEPIC for PV-Applications using PI Controller and Current Mode Co...Analysis of SEPIC for PV-Applications using PI Controller and Current Mode Co...
Analysis of SEPIC for PV-Applications using PI Controller and Current Mode Co...
ijsrd.com
 
Garbage Management using Android Smartphone
Garbage Management using Android SmartphoneGarbage Management using Android Smartphone
Garbage Management using Android Smartphone
ijsrd.com
 
Performance Optimization of Clustering On GPU
 Performance Optimization of Clustering On GPU Performance Optimization of Clustering On GPU
Performance Optimization of Clustering On GPU
ijsrd.com
 
Performance, Optimization and CFD Analysis of Submersible Pump Impeller
Performance, Optimization and CFD Analysis of Submersible Pump ImpellerPerformance, Optimization and CFD Analysis of Submersible Pump Impeller
Performance, Optimization and CFD Analysis of Submersible Pump Impeller
ijsrd.com
 
Material Removal Rate, Tool Wear Rate and Surface Roughness Analysis of EDM P...
Material Removal Rate, Tool Wear Rate and Surface Roughness Analysis of EDM P...Material Removal Rate, Tool Wear Rate and Surface Roughness Analysis of EDM P...
Material Removal Rate, Tool Wear Rate and Surface Roughness Analysis of EDM P...
ijsrd.com
 
Enhancing the Performance & Emission for the Blend of Diesel & Pyrolysis oil ...
Enhancing the Performance & Emission for the Blend of Diesel & Pyrolysis oil ...Enhancing the Performance & Emission for the Blend of Diesel & Pyrolysis oil ...
Enhancing the Performance & Emission for the Blend of Diesel & Pyrolysis oil ...
ijsrd.com
 
VRaaS [Virtual Reality as a Service]: Integrated architecture for VR Applicat...
VRaaS [Virtual Reality as a Service]: Integrated architecture for VR Applicat...VRaaS [Virtual Reality as a Service]: Integrated architecture for VR Applicat...
VRaaS [Virtual Reality as a Service]: Integrated architecture for VR Applicat...
ijsrd.com
 
Analysis of VoIP Forensics with Digital Evidence Procedure
Analysis of VoIP Forensics with Digital Evidence ProcedureAnalysis of VoIP Forensics with Digital Evidence Procedure
Analysis of VoIP Forensics with Digital Evidence Procedure
ijsrd.com
 
Voltage Stability & Power Quality Assessment of Distributed Generation Based ...
Voltage Stability & Power Quality Assessment of Distributed Generation Based ...Voltage Stability & Power Quality Assessment of Distributed Generation Based ...
Voltage Stability & Power Quality Assessment of Distributed Generation Based ...
ijsrd.com
 
Real-Time Monitoring and Control System for Industry
Real-Time Monitoring and Control System for IndustryReal-Time Monitoring and Control System for Industry
Real-Time Monitoring and Control System for Industry
ijsrd.com
 

Viewers also liked (17)

Handwritten Script Recognition
Handwritten Script RecognitionHandwritten Script Recognition
Handwritten Script Recognition
 
Process parameter optimization of SLM process and application of Taguchi appr...
Process parameter optimization of SLM process and application of Taguchi appr...Process parameter optimization of SLM process and application of Taguchi appr...
Process parameter optimization of SLM process and application of Taguchi appr...
 
Waste Minimization and Cost Reduction in Process Industries
Waste Minimization and Cost Reduction in Process IndustriesWaste Minimization and Cost Reduction in Process Industries
Waste Minimization and Cost Reduction in Process Industries
 
Exhaust analysis of four stroke single cylinder diesel engine using copper ba...
Exhaust analysis of four stroke single cylinder diesel engine using copper ba...Exhaust analysis of four stroke single cylinder diesel engine using copper ba...
Exhaust analysis of four stroke single cylinder diesel engine using copper ba...
 
Analysis of Parking Demand and Suggesting Alternative for Parking (A Case Stu...
Analysis of Parking Demand and Suggesting Alternative for Parking (A Case Stu...Analysis of Parking Demand and Suggesting Alternative for Parking (A Case Stu...
Analysis of Parking Demand and Suggesting Alternative for Parking (A Case Stu...
 
Wireless Sensor Network: Topology Issues
Wireless Sensor Network: Topology IssuesWireless Sensor Network: Topology Issues
Wireless Sensor Network: Topology Issues
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
Analysis of SEPIC for PV-Applications using PI Controller and Current Mode Co...
Analysis of SEPIC for PV-Applications using PI Controller and Current Mode Co...Analysis of SEPIC for PV-Applications using PI Controller and Current Mode Co...
Analysis of SEPIC for PV-Applications using PI Controller and Current Mode Co...
 
Garbage Management using Android Smartphone
Garbage Management using Android SmartphoneGarbage Management using Android Smartphone
Garbage Management using Android Smartphone
 
Performance Optimization of Clustering On GPU
 Performance Optimization of Clustering On GPU Performance Optimization of Clustering On GPU
Performance Optimization of Clustering On GPU
 
Performance, Optimization and CFD Analysis of Submersible Pump Impeller
Performance, Optimization and CFD Analysis of Submersible Pump ImpellerPerformance, Optimization and CFD Analysis of Submersible Pump Impeller
Performance, Optimization and CFD Analysis of Submersible Pump Impeller
 
Material Removal Rate, Tool Wear Rate and Surface Roughness Analysis of EDM P...
Material Removal Rate, Tool Wear Rate and Surface Roughness Analysis of EDM P...Material Removal Rate, Tool Wear Rate and Surface Roughness Analysis of EDM P...
Material Removal Rate, Tool Wear Rate and Surface Roughness Analysis of EDM P...
 
Enhancing the Performance & Emission for the Blend of Diesel & Pyrolysis oil ...
Enhancing the Performance & Emission for the Blend of Diesel & Pyrolysis oil ...Enhancing the Performance & Emission for the Blend of Diesel & Pyrolysis oil ...
Enhancing the Performance & Emission for the Blend of Diesel & Pyrolysis oil ...
 
VRaaS [Virtual Reality as a Service]: Integrated architecture for VR Applicat...
VRaaS [Virtual Reality as a Service]: Integrated architecture for VR Applicat...VRaaS [Virtual Reality as a Service]: Integrated architecture for VR Applicat...
VRaaS [Virtual Reality as a Service]: Integrated architecture for VR Applicat...
 
Analysis of VoIP Forensics with Digital Evidence Procedure
Analysis of VoIP Forensics with Digital Evidence ProcedureAnalysis of VoIP Forensics with Digital Evidence Procedure
Analysis of VoIP Forensics with Digital Evidence Procedure
 
Voltage Stability & Power Quality Assessment of Distributed Generation Based ...
Voltage Stability & Power Quality Assessment of Distributed Generation Based ...Voltage Stability & Power Quality Assessment of Distributed Generation Based ...
Voltage Stability & Power Quality Assessment of Distributed Generation Based ...
 
Real-Time Monitoring and Control System for Industry
Real-Time Monitoring and Control System for IndustryReal-Time Monitoring and Control System for Industry
Real-Time Monitoring and Control System for Industry
 

Similar to GreenSQL Security

Devoid Web Application From SQL Injection Attack
Devoid Web Application From SQL Injection AttackDevoid Web Application From SQL Injection Attack
Devoid Web Application From SQL Injection Attack
IJRESJOURNAL
 
E017131924
E017131924E017131924
E017131924
IOSR Journals
 
SQL Injection Prevention by Adaptive Algorithm
SQL Injection Prevention by Adaptive AlgorithmSQL Injection Prevention by Adaptive Algorithm
SQL Injection Prevention by Adaptive Algorithm
IOSR Journals
 
Security vulnerabilities related to web-based data
Security vulnerabilities related to web-based dataSecurity vulnerabilities related to web-based data
Security vulnerabilities related to web-based data
TELKOMNIKA JOURNAL
 
INTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARD
INTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARDINTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARD
INTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARD
IJCI JOURNAL
 
Security For Application Development
Security For Application DevelopmentSecurity For Application Development
Security For Application Development
6502programmer
 
SQLSecurity.ppt
SQLSecurity.pptSQLSecurity.ppt
SQLSecurity.ppt
LokeshK66
 
SQLSecurity.ppt
SQLSecurity.pptSQLSecurity.ppt
SQLSecurity.ppt
CNSHacking
 
Ld3420072014
Ld3420072014Ld3420072014
Ld3420072014
IJERA Editor
 
Modern Data Security for the Enterprises – SQL Server & Azure SQL Database
Modern Data Security for the Enterprises – SQL Server & Azure SQL DatabaseModern Data Security for the Enterprises – SQL Server & Azure SQL Database
Modern Data Security for the Enterprises – SQL Server & Azure SQL Database
WinWire Technologies Inc
 
SQL Injection and Clickjacking Attack in Web security
SQL Injection and Clickjacking Attack in Web securitySQL Injection and Clickjacking Attack in Web security
SQL Injection and Clickjacking Attack in Web security
Moutasm Tamimi
 
Sql security
Sql securitySql security
Sql security
Safwan Hashmi
 
A hybrid technique for sql injection attacks detection and prevention
A hybrid technique for sql injection attacks detection and preventionA hybrid technique for sql injection attacks detection and prevention
A hybrid technique for sql injection attacks detection and prevention
ijdms
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions www.ijeijournal.com
 
1738 1742
1738 17421738 1742
1738 1742
Editor IJARCET
 
1738 1742
1738 17421738 1742
1738 1742
Editor IJARCET
 
Prevention of SQL Injection Attack in Web Application with Host Language
Prevention of SQL Injection Attack in Web Application with Host LanguagePrevention of SQL Injection Attack in Web Application with Host Language
Prevention of SQL Injection Attack in Web Application with Host Language
IRJET Journal
 
Secure Software Engineering
Secure Software EngineeringSecure Software Engineering
Secure Software Engineering
Rohitha Liyanagama
 
Ijcatr04041018
Ijcatr04041018Ijcatr04041018
Ijcatr04041018
Editor IJCATR
 
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...
IJARIIT
 

Similar to GreenSQL Security (20)

Devoid Web Application From SQL Injection Attack
Devoid Web Application From SQL Injection AttackDevoid Web Application From SQL Injection Attack
Devoid Web Application From SQL Injection Attack
 
E017131924
E017131924E017131924
E017131924
 
SQL Injection Prevention by Adaptive Algorithm
SQL Injection Prevention by Adaptive AlgorithmSQL Injection Prevention by Adaptive Algorithm
SQL Injection Prevention by Adaptive Algorithm
 
Security vulnerabilities related to web-based data
Security vulnerabilities related to web-based dataSecurity vulnerabilities related to web-based data
Security vulnerabilities related to web-based data
 
INTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARD
INTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARDINTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARD
INTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARD
 
Security For Application Development
Security For Application DevelopmentSecurity For Application Development
Security For Application Development
 
SQLSecurity.ppt
SQLSecurity.pptSQLSecurity.ppt
SQLSecurity.ppt
 
SQLSecurity.ppt
SQLSecurity.pptSQLSecurity.ppt
SQLSecurity.ppt
 
Ld3420072014
Ld3420072014Ld3420072014
Ld3420072014
 
Modern Data Security for the Enterprises – SQL Server & Azure SQL Database
Modern Data Security for the Enterprises – SQL Server & Azure SQL DatabaseModern Data Security for the Enterprises – SQL Server & Azure SQL Database
Modern Data Security for the Enterprises – SQL Server & Azure SQL Database
 
SQL Injection and Clickjacking Attack in Web security
SQL Injection and Clickjacking Attack in Web securitySQL Injection and Clickjacking Attack in Web security
SQL Injection and Clickjacking Attack in Web security
 
Sql security
Sql securitySql security
Sql security
 
A hybrid technique for sql injection attacks detection and prevention
A hybrid technique for sql injection attacks detection and preventionA hybrid technique for sql injection attacks detection and prevention
A hybrid technique for sql injection attacks detection and prevention
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
1738 1742
1738 17421738 1742
1738 1742
 
1738 1742
1738 17421738 1742
1738 1742
 
Prevention of SQL Injection Attack in Web Application with Host Language
Prevention of SQL Injection Attack in Web Application with Host LanguagePrevention of SQL Injection Attack in Web Application with Host Language
Prevention of SQL Injection Attack in Web Application with Host Language
 
Secure Software Engineering
Secure Software EngineeringSecure Software Engineering
Secure Software Engineering
 
Ijcatr04041018
Ijcatr04041018Ijcatr04041018
Ijcatr04041018
 
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...
 

More from ijsrd.com

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
ijsrd.com
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
ijsrd.com
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
ijsrd.com
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
ijsrd.com
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
ijsrd.com
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
ijsrd.com
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
ijsrd.com
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
ijsrd.com
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
ijsrd.com
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
ijsrd.com
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
ijsrd.com
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
ijsrd.com
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
ijsrd.com
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
ijsrd.com
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
ijsrd.com
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
ijsrd.com
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
ijsrd.com
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
ijsrd.com
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
ijsrd.com
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
ijsrd.com
 

More from ijsrd.com (20)

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
 

Recently uploaded

Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
aryanpankaj78
 
Accident detection system project report.pdf
Accident detection system project report.pdfAccident detection system project report.pdf
Accident detection system project report.pdf
Kamal Acharya
 
Open Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surfaceOpen Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surface
Indrajeet sahu
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
PreethaV16
 
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
MadhavJungKarki
 
Generative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdfGenerative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdf
mahaffeycheryld
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
PriyankaKilaniya
 
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
DharmaBanothu
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
ijaia
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
VANDANAMOHANGOUDA
 
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptxSENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
b0754201
 
Unit -II Spectroscopy - EC I B.Tech.pdf
Unit -II Spectroscopy - EC  I B.Tech.pdfUnit -II Spectroscopy - EC  I B.Tech.pdf
Unit -II Spectroscopy - EC I B.Tech.pdf
TeluguBadi
 
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
sydezfe
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
Roger Rozario
 
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdfAsymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
felixwold
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
ElakkiaU
 
5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf
AlvianRamadhani5
 
Introduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.pptIntroduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.ppt
Dwarkadas J Sanghvi College of Engineering
 
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
OKORIE1
 

Recently uploaded (20)

Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
 
Accident detection system project report.pdf
Accident detection system project report.pdfAccident detection system project report.pdf
Accident detection system project report.pdf
 
Open Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surfaceOpen Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surface
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
 
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
 
Generative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdfGenerative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdf
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
 
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
 
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptxSENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
 
Unit -II Spectroscopy - EC I B.Tech.pdf
Unit -II Spectroscopy - EC  I B.Tech.pdfUnit -II Spectroscopy - EC  I B.Tech.pdf
Unit -II Spectroscopy - EC I B.Tech.pdf
 
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
 
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdfAsymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
 
5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf
 
Introduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.pptIntroduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.ppt
 
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
 

GreenSQL Security

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 4, 2013 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 877 Abstract— In today's modern world, security is a necessary fact of life. GreenSQL Security helps small to large organizations protect their sensitive information against internal and external threats. The rule-based engine offers database firewall, intrusion detection and prevention (IDS/IPS). GreenSQL Security Engine applies exception detection to prevent hacker attacks, end-user intrusion and unauthorized access by privileged insiders. The system provides a web based intuitive and flexible policy framework that enables users to create and edit their security rules quickly and easily. GreenSQL interfaces between your database and any source requiring a connection to it. This approach shields your database application and database operating system from direct, remote access. GreenSQL Database Security 1) Stops SQL Injection attacks on your web application 2) Blocks unauthorized database access and alerts you in real time about unwanted access 3) Separates your application database access privileges from administrator access 4) Gives you a complete event log for investigating database traffic and access 5) Ensures you achieve successful implementation with 24/7 support Keywords: SQL injection, web architecture, SQL tautology, IDS (intrusion detection), IPS (intrusion prevention ) I. SQL INJECTION SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. The vulnerability is present when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and thereby unexpectedly executed. It is an instance of a more general class of vulnerabilities that can occur whenever one programming or scripting language is embedded inside another. SQL injection is a basic attack used to either gain unauthorized access to database or to retrieve information directly from the database. SQL injection is a technique used to take advantage of no validated input vulnerabilities to pass SQL commands through a web application for execution by a backend database. SQL commands are injected from the web form into the databse of an application to change the databse content or dump the database information like creditcard or password to attacker. Most web applications include a back-end database, either running on a separate database server, or installed on the same machine as the web server itself. SQL Injection is one of the most common application layer attack techniques used today[1]. A. Web Application Architecture Web application commonly has three tiers: presentation, logic, and storage. The presentation tier is the topmost level of the application. It displays information related to such services as browsing merchandise, purchasing, and shopping cart contents, and it communicates with other tiers by outputting results to the browser/client tier and all other tiers in the network. [2] The logic tier is pulled out from the presentation tier, and as its own layer, it controls an application’s functionality by performing detailed processing. The data tier consists of database servers. Here, information is stored and retrieved. This tier keeps data independent from application servers or business logic. Fig.1: Web Application Architecture Giving data its own tier also improves scalability and performance. In this Figure, the Web browser (presentation) sends requests to the middle tier (logic), which services GreenSQL Security Jaydeep K. Dabhi1 Ass. Prof. Tarun K. Sureja2 1 M.E. CE (I.T. Systems & Network Security) 2 M. Tech (CSE) 1 AVPTI, Rajkot, Gujarat Technological University 2 NIT, Rourkela S.P.B.Patel Engineering College, Mehsana, Gujarat
  • 2. GreenSQL Security (IJSRD/Vol. 1/Issue 4/2013/0018) All rights reserved by www.ijsrd.com 878 them by making queries and updates against the database (storage). A fundamental rule in three-tier architecture is that the presentation tier never communicates directly with the data tier; in a three-tier model, all communication must pass through the middleware tier. In this Figure, the user fires up his Web browser and connect to http://www.victim.com. The Web server that resides in the logic tier loads the script from the file system and passes it through its scripting engine, where it is parsed and executed. The script opens a connection to the storage tier using a database connector and executes an SQL statement against the database. The database returns the data to the database connector, which is passed to the scripting engine within the logic tier. The logic tier then implements any application or business logic rules before returning a Web page in HTML format to the user’s Web browser within the presentation tier. The user’s Web browser renders the HTML and presents the user with a graphical representation of the code. [4] B. GreenSQL GreenSQL database firewall used to protect databases from SQL injection attacks. GreenSQL works as a proxy for SQL commands and has built in support for MySQL & PostgreSQL. GreenSQL secure database from unauthorized access by monitoring every SQL command sent to the databases. GreenSQL helps business secure their information assets and demonstrate regulatory compliances. The logic is based on evaluation of SQL commands using a risk scoring matrix as well as blocking known db Administrative commands (DROP, CREATE, etch). GreenSQL is distributed under the GPL license. C. Calculating a query's risk GreenSQL calculates each query's risk. Essentially, this is an anomaly detection subsystem. After the risk is calculated, GreenSQL can block the query or just create a warning message (this depends on the application mode). There are a number of heuristics GreenSQL uses when calculating risk [6] For example, query risk is increased by: 1) Fingerprinting of Database (users, accounts, credit information) 2) Stack Based Query (Comments inside SQL commands) 3) An SQL expression that always returns true (SQL tautology)[10] II. SQL TAUTOLOGY This type of attack injects SQL tokens to the conditional query statement to be evaluated always true. This type of attack used to bypass authentication control and access to data by exploiting vulnerable input field which use WHERE clause. "SELECT * FROM employee WHERE userid = '112' and password ='aaa' OR '1 '='1 III As the tautology statement (1=1) has been added to the query statement so it is always true.[11] III. MODES OF GREENSQL The GreenSQL db firewall can be used in a number of ways:[7][8][9] 1) IDS 2) IPS 3) Learning mode 4) Database firewall A. IDS Mode During Simulation Mode basically nothing is blocked. GreenSQL works as a database IDS system (IDS stands for Intrusion Detection System).During this mode, our risk scoring matrix engine identifies suspicious queries and notifies the database administrator using the GreenSQL Management Console. B. IPS Mode When the system is configured to Block Suspicious Commands, GreenSQL uses its heuristics engine to find "illegal" queries and block them automatically. In this mode, GreenSQL is basically a database IPS system (IPS is Intrusion Prevention System). If a query is considered illegal, a whitelist is checked. If it is found in the whitelist, it will be redirected to the genuine MySQL server. If it is found to be "illegal", GreenSQL will return an empty result set to THE application. During this mode, GreenSQL can sometimes generate false positive and false negative errors. As a result, some legal queries may be blocked or the GreenSQL system may pass through an "illegal" query undetected. These are the pros and cons of IPS systems. GreenSQL is constantly improving its heuristics engine but it is still not perfect. C. Learning Mode The above methods we recommend enabling Learning Mode and then, after the learning period is over, switching to the Active protection from unknown queries. During the learning mode, all queries are automatically added to the whitelist. When the learning mode is over, GreenSQL automatically enables active protection. D. Database Firewall Mode When Active protection from unknown queries mode is enabled, all unknown commands are blocked. This is database firewall mode. When an unknown SQL command is detected, it is automatically blocked.
  • 3. GreenSQL Security (IJSRD/Vol. 1/Issue 4/2013/0018) All rights reserved by www.ijsrd.com 879 IV. GREENSQL ARCHITECTURE GreenSQL works as a reverse proxy for MySQL connections. This means, that instead of connecting TO THE MySQL server, your applications will connect to THE GreenSQL server. [9] GreenSQL will analyze SQL queries and then, if they're safe, will forward them to the back-end MySQL server. The following picture describes the whole process. [12][7] Fig 2: GreenSQL Architecture As you can see, GreenSQL calls the real database server to execute SQL commands and the web application connects to the GreenSQL server as if it were a real database server. GreenSQL can be installed together with the database server on the same computer or it can use a distinct server. By default GreenSQL listens on local port 127.0.0.1:3305 redirecting SQL requests to 127.0.0.1:3306 (the default MySQL setting). These settings can be altered using the GreenSQL Console. V. CONCLUSION 1) Provides great security regarding different sql attacks. 2) Can be used as a penetration tool!!! REFERENCES [1] Justin Clarke, SQL Injection Attacks and Defense, Second Edition, Syngress Publication, July 2, 2012,ISBN-13: 978-1597494243 [2] GreenSQL Available: http://www.greensql.net/ [3] GreenSQL Available: http://www.howtoforge.com/preventing-mysql- injection-attacks-with-greensql-on-debian-etch [4] GreenSQL Available: http://www.greensql.com/docs [5] GreenSQL Available: http://www.greensql.com/support/knowledge [6] GreenSQL Available: http://www.greensql.com/why- greensql-db-security/top-10-reasons [7] GreenSQL Available: http://community.spiceworks.com/topic/212598- database-firewall-greensql [8] GreenSQL Available: http://www.techrepublic.com/blog/opensource/firewall- mysql-with-greensql/317 [9] GreenSQL Available: http://opensourcedba.wordpress.com/2012/03/26/databas e-firewalls-from-oracle-and-greensql/