信息网络安全 ›› 2016, Vol. 16 ›› Issue (2): 66-73.doi: 10.3969/j.issn.1671-1122.2016.02.011

• • 上一篇    下一篇

新型SQL注入及其防御技术研究与分析

李鑫1(), 张维纬1, 隋子畅2, 郑力新1   

  1. 1. 华侨大学工学院,福建泉州 362021
    2. 东北林业大学信息与计算机工程学院,黑龙江哈尔滨 150000
  • 收稿日期:2015-12-15 出版日期:2016-02-10 发布日期:2020-05-13
  • 作者简介:

    作者简介: 李鑫(1990—),男,山东,硕士研究生,主要研究方向为网络信息安全;张维纬(1982—),男,福建,硕士生导师,博士,主要研究方向为信息安全;隋子畅(1995—),男,山东,本科,主要研究方向信息安全;郑力新(1967—),男,福建,教授,博士,主要研究方向为智能仪器和系统控制。

  • 基金资助:
    福建省自然科学基金[2015J05125];福建省科技厅专项资助项目[2013H2002];华侨大学研究生科研创新能力培育计划资助项目 [1400422005];华侨大学科研基金资助项目[13BS415];泉州市科技计划项目[2014Z112]

Research and Analysis on the Novel SQL Injection and Defense Technique

Xin LI1(), Weiwei ZHANG1, Zichang SUI2, Lixin ZHENG1   

  1. 1. College of Engineering, Huaqiao University, Quanzhou Fujian 362021, China
    2. Information and Computer Engineering College, Northeast Forestry University, Harbin Heilongjiang 150000,China
  • Received:2015-12-15 Online:2016-02-10 Published:2020-05-13

摘要:

SQL注入严重威胁Web安全,并在近些年发展出新的技术。当前研究主要集中于对传统SQL注入技术的检测与防御,而忽视了新型SQL注入技术。文章在介绍传统SQL注入和现有防御技术的基础上,详细介绍了3种新型SQL注入技术——客户端SQL注入、防注检测绕过和二阶SQL注入,并从注入的效果、防御方法等方面对传统与新型SQL注入技术进行了分析比较。对注入效果的分析结果表明,新型SQL注入技术具有危害大、影响范围广、依赖手工实施等特点;对防御方法的分析结果表明,新型SQL注入技术虽然能够突破一些传统的防御方案,但是依赖现有防御技术能够对其进行有效防御。文章并在分析的最后针对每一种技术提出了适合的Web防御方案。

关键词: SQL注入, Web安全, Web防御

Abstract:

SQL injection is one of the most serious threats for Web security, and has developed new technologies in recent years. Researchers put more focus on detection and prevention of traditional SQL injection technique, rather than the novel SQL injection technique. Based on the introduction of traditional SQL injection and existing defense technologies, this paper introduces client SQL injection, detection bypass and second-order SQL injection. Finally we compare 5 traditional SQL injection technologies and 3 new SQL injection technologies through the aspects of effects and prevention. Analysis of the injection effect shows that the new SQL injection technology has the characteristics of great harm, wide influence, and relying on the manual implementation. Analysis of the defense method shows that although the new SQL injection technology can break through some of the traditional defense schemes, the existing defense technology still can effectively defend it. At the end of the analysis a suitable, Web defense scheme for each technology is proposed.

Key words: SQL injection, Web security, Web defense

中图分类号: