DOI QR코드

DOI QR Code

SQL 질의 애트리뷰트 값 제거 방법을 이용한 효과적인 SQL Injection 공격 탐지 방법 연구

A Method for SQL Injection Attack Detection using the Removal of SQL Query Attribute Values

  • 이인용 (고려대학교, 정보경영공학전문대학원) ;
  • 조재익 (고려대학교, 정보경영공학전문대학원) ;
  • 조규형 (고려대학교, 정보경영공학전문대학원) ;
  • 문종섭 (고려대학교, 정보경영공학전문대학원)
  • Lee, In-Yong (Graduate School of Information Management and Security, Korea University) ;
  • Cho, Jae-Ik (Graduate School of Information Management and Security, Korea University) ;
  • Cho, Kyu-Hyung (Graduate School of Information Management and Security, Korea University) ;
  • Moon, Jong-Sub (Graduate School of Information Management and Security, Korea University)
  • 발행 : 2008.10.30

초록

인터넷이 발전함에 따라 웹 애플리케이션을 이용한 서비스가 대중화되었고, 웹 애플리케이션의 취약점을 목표로 하는 공격들도 증가하게 되었다. 많은 웹 공격 중의 하나인 SQL Injection 공격은 민감한 데이터를 처리하는 곳에서는 매우 치명적이고 위험하기 때문에 이를 탐지하고 예방하기 위한 연구들이 다양하게 이루어져 왔다. 이로 인하여 SQL Injection 공격들이 많이 감소했지만 아직도 이를 우회하는 방법들이 존재하며, 기존의 연구 방법들 또한 매우 복잡하여 실제 웹 애플리케이션에 적용하여 사용하기 어렵다. 따라서 본 논문에서는 SQL Injection 공격 탐지를 위해 웹 애플리케이션에 고정되어 있는 정적 SQL 질의와 사용자로부터 생성되는 동적 SQL 질의의 애트리뷰트 값을 제거한 정적 및 동적 분석 방법을 제안하고, 실험을 통하여 효율성을 검증하였다.

The expansion of the internet has made web applications become a part of everyday lift. As a result the number of incidents which exploit web application vulnerabilities are increasing. A large percentage of these incidents are SQL Injection attacks which are a serious security threat to databases with potentially sensitive information. Therefore, much research has been done to detect and prevent these attacks and it resulted in a decline of SQL Injection attacks. However, there are still methods to bypass them and these methods are too complex to implement in real web applications. This paper proposes a simple and effective SQL Query attribute value removal method which uses Static and Dynamic Analysis and evaluates the efficiency through various experiments.

키워드

참고문헌

  1. 국가사이버안전센터, "2008 국가 정보보호 백서", 2008
  2. The Open Web Application Security Project, "OWASP TOP 10 Project", http://www.owasp.org/
  3. PHP, magic quotes, http://www.php.net/magic_quotes/
  4. Apache Struts project, Struts. http://struts.apache.org/
  5. C. Gould, Z. Su, P. Devanbu, "JDBC Checker :A Static Analysis Tool for SQL/JDBC Applications", In Proceedings of the 26th International Conference on Software Engineering (ICSE), pp. 697-698, 2004
  6. G Wassermann, Z. Su, "An Analysis Framework for Security in Web Applications", In Proceedings of the FSE Workshop on Specification and Verification of Component-Based Systems(SAVCBS), pp. 70-78, 2004
  7. Thomas. S, Williams. L, "Using Automated Fix Generation ot Secure SQL Statements", In Proceeding of the 29th international Conference on Software Engineering Workshops (ICSEW. IEEE Computer Society), pp. 54, 2007
  8. Paros. Parosproxy.org, http://www.parosproxy.org/
  9. Kosuga. Y, Kernel. K, Hanaoka. M, Hishiyama. M, Takahama. Yu, "Sania:Syntactic and Semantic Analysis for Automated Testing against SQL Injection", In Proceedings of the Computer Security Applications Conference 2007, pp. 107-117, 2007
  10. Yonghee Shin, "Improving the Identification of Actual Input Manipulation Vulnerabilities", 14th ACM SIGSOFT Symposium on Foundations of Software Engineering ACM, 2006
  11. Z. Su, G. Wassermann, "The Essence of Command Injection Attacks in Web Applications", In Conference Record of the 33rd ACM SIGPLANSIGACT Symposium on Principles of Programming Languages, pp. 372-382, 2006
  12. Halfond W. G, Orso. A, "AMNESIA: Analysis and Monitoring for NEutralizing SQL-Injection Attacks", In Proceedings of the 20th IEEE/ACM international Conference on Automated Software Engineering, pp. 174- 183, 2005
  13. Buehrer. G, Weide. B. W, Sivilotti. P A, "Using Parse Tree Validation to Prevent SQL Injection Attacks", In Proceedings of the 5th international Workshop on Software Engineering and Middleware, pp. 105-113, 2005
  14. Wei. K, Muthuprasanna. M, Kothari. S, "Preventing SQL injection attacks in stored procedures", Software Engineering Conference 2006. Australian, pp. 18-21, 2006
  15. S. Boyd, A. Keromytis, "SQLrand:Preventing SQL injection attacks", Applied Cryptography and Network Security LNCS, Volume 3089, pp. 292-302, 2004
  16. Jae-Chul Park, Bong-Nam Noh, "SQL Injection Attack Detection:Profiling of Web Application Parameter Using the Sequence Pairwise Alignment", Information Security Applications LNCS, Volume 4298, pp. 74-82, 2007
  17. F. Valeur, D. Mutz, G. Vigna, "A Learning- Based Approach to the Detection of SQL Attacks", In Proceedings of the Conference on Detection of Intrusions and Malware and Vulnerability Assessment, pp 123-140, 2005
  18. Huang. Y, Huang. S, Lin. T, Tasi. C, "Web application security assessment by fault injection and behavior monitoring", In Proceedings of the 12th international Conference on World Wide Web, pp 148-159, 2003
  19. GotoCode, http://www.gotocode.com/
  20. W. G. Halfond, J. Viegas, A. Orso, "A Classification of SQL-Injection Attacks and Countermeasures", In proceeding on International Symposium on Secure Software Engineering Raleigh, NC, USA, pp. 65-81, 2006