Loading...
|
Please use this identifier to cite or link to this item:
https://nccur.lib.nccu.edu.tw/handle/140.119/94853
|
Title: | 運用使用者輸入欄位屬性偵測防禦資料隱碼攻擊 Preventing SQL Injection Attacks Using the Field Attributes of User Input |
Authors: | 賴淑美 Lai, Shu Mei |
Contributors: | 陳恭 賴淑美 Lai, Shu Mei |
Keywords: | 跨站腳本攻擊 注入弱點 網站攻擊 動態攔截檢核 檢查網頁輸入資料 Injection Flaws Cross Site Scripting website attack website dynamic captures technique check the input data of data fields |
Date: | 2009 |
Issue Date: | 2016-05-09 12:02:16 (UTC+8) |
Abstract: | 在網路的應用蓬勃發展與上網使用人口不斷遞增的情況之下,透過網路提供客戶服務及從事商業行為已經是趨勢與熱潮,而伴隨而來的風險也逐步顯現。在一個無國界的網路世界,威脅來自四面八方,隨著科技進步,攻擊手法也隨之加速且廣泛。網頁攻擊防範作法的演進似乎也只能一直追隨著攻擊手法而不斷改進。但最根本的方法應為回歸原始的程式設計,網頁欄位輸入資料的檢核。確實做好欄位內容檢核並遵守網頁安全設計原則,嚴謹的資料庫存取授權才能安心杜絕不斷變化的攻擊。但因既有系統對於輸入欄位內容,並無確切根據應輸入的欄位長度及屬性或是特殊表示式進行檢核,以致造成類似Injection Flaws[1]及部分XSS(Cross Site Scripting)[2]攻擊的形成。
面對不斷變化的網站攻擊,大都以系統原始碼重覆修改、透過滲透測試服務檢視漏洞及購買偵測防禦設備防堵威脅。因原始碼重覆修改工作繁重,滲透測試也不能經常施行,購買偵測防禦設備也相當昂貴。
本研究回歸網頁資料輸入檢核,根據輸入資料的長度及屬性或是特殊的表示式進行檢核,若能堅守此項原則應可抵禦大部分的攻擊。但因既有系統程式龐大,若要重新檢視所有輸入欄位屬性及進行修改恐為曠日費時。本文中研究以側錄分析、資料庫SCHEMA的結合及方便的欄位屬性定義等功能,自動化的處理流程,快速產生輸入欄位的檢核依據。再以網站動態欄位檢核的方式,於網站接收使用者需求,且應用程式尚未處理前攔截網頁輸入資料,根據事先明確定義的網站欄位屬性及長度進行資料檢核,如此既有系統即無須修改,能在最低的成本下達到有效防禦的目的。 With the dynamic development of network application and the increasing population of using internet, providing customer service and making business through network has been a prevalent trend recently.
However, the risk appears with this trend. In a borderless net world, threaten comes from all directions. With the progress of information technology, the technique of network attack becomes timeless and widespread. It seems that defense methods have to develop against these attack techniques. But the root of all should regress on the original program design – check the input data of data fields. The prevention of unceasing network attack is precisely check the content of data field and adhere to the webpage security design on principle, furthermore, the authority to access database is essential. Since most existing systems do not have exactly checkpoints of those data fields such as the length, the data type, and the data format, as a result, those conditions resulted in several network attacks like Injection Flaws and XSS.
In response to various website attack constantly, the majority remodify the system source code, inspect vulnerabilities by the service of penetration test, and purchase the equipment of Intrusion Prevention Systems(IPS). However, several limitations influence the performance, such as the massive workload of remodify source code, the difficulty to implement the daily penetration test, and the costly expenses of IPS equipment.
The fundamental method of this research is to check the input data of data fields which bases on the length, the data type and the data format to check input data. The hypothesis is that to implement the original design principle should prevent most website attacks. Unfortunately, most legacy system programs are massive and numerous. It is time-consuming to review and remodify all the data fields. This research investigates the analysis of network interception, integrates with the database schema and the easy-defined data type, to automatically process these procedures and rapidly generates the checklist of input data. Then, using the method of website dynamic captures technique to receive user request first and webpage input data before the system application commences to process it.
According to those input data can be checked by the predefined data filed type and the length, there is no necessary to modify existing systems and can achieve the goal to prevent web attack with the minimum cost. |
Reference: | 1. Injection Flaws
http://www.owasp.org/index.php/Injection_Flaws
2. XSS
http://en.wikipedia.org/wiki/Cross-site_scripting
3. Google_hacking
http://en.wikipedia.org/wiki/Google_hacking
4. 阿碼科技 2008.05.20新聞「台灣網站遭受有史以來最大規模SQL Injection 攻擊
新型態的Mass SQL Injection在台上演」
http://www.armorize.com.tw/news/shownews.php?news=22
5. 林玉美,「基於資料探勘技術之網站應用型入侵防禦系統」,國立台灣科技大學資訊工程系研碩士學位論文
6. OWASP公布最新2007年版十大Web安全漏洞---OWASP介紹與近期發展
http://owasp.org.tw/blog/2007/05/owasp2007webowasp.html
7. The Open Web Application Security Project (OWASP) http://www.owasp.org/index.php/Main_Page
8. SQL Injection (資料隱碼)– 駭客的 SQL填空遊戲(上)
http://www.microsoft.com/taiwan/sql/SQL_Injection_G1.htm
9. 黃彥棻 2008-06-13SQL Injection機器人來襲
10. 淺談網路應用程式安全(一) 中央研究院計算中心通訊電子報
http://newsletter.ascc.sinica.edu.tw/news/read_news.php?nid=1288
11. ISAPI
http://www.oreilly.com.tw/sample_chap/a053_01.pdf
12. Regular Expressions - User guide
http://www.zytrax.com/tech/web/regex.htm#intro
13. SQL Injection攻擊常見惡意字串,行政院研究發展考核委員提供之「Web應用程式安全指引草案修訂版_附件檔_970229.pdf」中(附件6 ) |
Description: | 碩士 國立政治大學 資訊科學學系 93971007 |
Source URI: | http://thesis.lib.nccu.edu.tw/record/#G0093971007 |
Data Type: | thesis |
Appears in Collections: | [資訊科學系] 學位論文
|
Files in This Item:
File |
Size | Format | |
index.html | 0Kb | HTML2 | 279 | View/Open |
|
All items in 政大典藏 are protected by copyright, with all rights reserved.
|