• • 上一篇    下一篇

基于代理模式的 SQL 注入漏洞检测技术研究

韦存堂%赵晶玲%崔宝江   

  • 出版日期:2014-11-15
  • 基金资助:
    国家自然科学基金(61170268,61100047,61272493)

Research on SQL Injection Vulnerabilities Detection Technology Based on Proxy Mode

WEI Cun-tang%ZHAO Jing-ling%CUI Bao-jiang   

  • Online:2014-11-15
  • About author:北京邮电大学计算机学院,北京,100876

摘要: SQL 注入(SQL injection)漏洞是网站中普遍存在的漏洞之一,同时也是影响企业运营且最具破坏性的漏洞之一。SQL 注入漏洞的检测模式可分为手工分析和自动化工具扫描分析两种方式。虽然有很多自动化工具可以帮助我们快速检测 SQL 注入漏洞,但工具检测能力十分有限,就目前而言,扫描工具的最大瓶颈在于如何确保爬虫所得待测数据的全面性。由于爬虫技术的限制,大部分扫描工具的误报和漏报概率都比较大。人工分析虽然可以保证漏洞检测的准确度,但检测过程需要消耗大量时间且效率比较低下。针对此种情况,文章提出一种基于代理模式的 SQL 注入漏洞检测方法,该方法在兼顾准确率和效率的基础之上,综合利用已有漏洞检测工具的优点,实现快速全面收集待测数据,以此确保 SQL 注入漏洞检测的高效性和准确性。另外,文章还利用该方法对 Web 应用中的 XSS 漏洞进行了检测分析,并取得了非常好的效果。

Abstract: SQL injection vulnerability is one of the most common vulnerabilities in the Web site; also it's one of the most destructive loopholes during business operations. SQL injection vulnerability detection mode can be divided into manual and automated analysis. Although there are many automated tools that can help us quickly detect SQL injection vulnerability, but the capacity of the tools is very limited. For now, the biggest problem is how to ensure the comprehensive of the test data. Restricted to the crawler technology, the probability of false positives and false negatives of the automated tools is relatively large. Although the manual analysis way can ensure the accuracy of the vulnerability detection, but the testing process consumes a lot of time and low efficiency. In such cases, based on a proxy mode, this paper presents a SQL injection vulnerability detection way which can take full advantages of the existing vulnerability detection tools and achieve high efficiency and accuracy of SQL injection vulnerability detection. On the other hand, we also used this method to detect and analyze the XSS vulnerability in Web applications and have achieved very good results.