TransSQL: A translation and validation-based solution for SQL-injection attacks

Kai Xiang Zhang, Chia Jun Lin, Shih Jen Chen, Yanling Hwang, Hao Lun Huang, Fu Hau Hsu

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

16 Scopus citations

Abstract

SQL injection attacks, a class of injection flaw in which specially crafted input strings leads to illegal queries to databases, are one of the topmost threats to web applications. A number of research prototypes and commercial products that maintain the queries structure in web applications have been developed. But these techniques either fail to address the full scope of the problem or have limitations. Based on our observation that the injected string in a SQL injection attack is interpreted differently on different databases, in this paper, we propose a novel and effective solution TransSQL to solve this problem. TransSQL automatically translates a SQL request to a LDAP-equivalent request. After queries are executed on a SQL database and a LDAP one, TransSQL checks the difference in responses between a SQL database and a LDAP one to detect and block SQL injection attacks. Experimental results show that TransSQL is an effective and efficient solution against SQL injection attacks.

Original languageEnglish
Title of host publicationProceedings - 1st International Conference on Robot, Vision and Signal Processing, RVSP 2011
Pages248-251
Number of pages4
DOIs
StatePublished - 2011
Event1st International Conference on Robot, Vision and Signal Processing, RVSP 2011 - Kaohsiung, Taiwan
Duration: 21 Nov 201123 Nov 2011

Publication series

NameProceedings - 1st International Conference on Robot, Vision and Signal Processing, RVSP 2011

Conference

Conference1st International Conference on Robot, Vision and Signal Processing, RVSP 2011
Country/TerritoryTaiwan
CityKaohsiung
Period21/11/1123/11/11

Keywords

  • LDAP
  • SQL injection
  • Web security

Fingerprint

Dive into the research topics of 'TransSQL: A translation and validation-based solution for SQL-injection attacks'. Together they form a unique fingerprint.

Cite this