An algorithm for detecting SQL injection vulnerability using black-box testing
SQL Injection Attack (SQLIA) is one of the most severe attack that can be used against web database-driven applications. Attackers use SQLIA to obtain unauthorized access and perform unauthorized data modifications due to initial improper input validation by the web application developer. Various st...
Saved in:
Published in | Journal of ambient intelligence and humanized computing Vol. 11; no. 1; pp. 249 - 266 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Berlin/Heidelberg
Springer Berlin Heidelberg
01.01.2020
Springer Nature B.V |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | SQL Injection Attack (SQLIA) is one of the most severe attack that can be used against web database-driven applications. Attackers use SQLIA to obtain unauthorized access and perform unauthorized data modifications due to initial improper input validation by the web application developer. Various studies have shown that, on average, 64% of web applications worldwide are vulnerable to SQLIA due to improper input. To mitigate the devastating problem of SQLIA, this research proposes an automatic black box testing for SQL Injection Vulnerability (SQLIV). This acts to automate an SQLIV assessment in SQLIA. In addition, recent studies have shown that there is a need for improving the effectiveness of existing SQLIVS in order to reduce the cost of manual inspection of vulnerabilities and the risk of being attacked due to inaccurate false negative and false positive results. This research focuses on improving the effectiveness of SQLIVS by proposing an object-oriented approach in its development in order to help and minimize the incidence of false positive and false negative results, as well as to provide room for improving a proposed scanner by potential researchers. To test and validate the accuracy of research work, three vulnerable web applications were developed. Each possesses a different type of vulnerabilities and an experimental evaluation was used to validate the proposed scanner. In addition, an analytical evaluation is used to compare the proposed scanner with the existing academic scanners. The result of the experimental analysis shows significant improvement by achieving high accuracy compared to existing studies. Similarly, the analytical evaluations showed that the proposed scanner is capable of analyzing attacked page response using four different techniques. |
---|---|
AbstractList | SQL Injection Attack (SQLIA) is one of the most severe attack that can be used against web database-driven applications. Attackers use SQLIA to obtain unauthorized access and perform unauthorized data modifications due to initial improper input validation by the web application developer. Various studies have shown that, on average, 64% of web applications worldwide are vulnerable to SQLIA due to improper input. To mitigate the devastating problem of SQLIA, this research proposes an automatic black box testing for SQL Injection Vulnerability (SQLIV). This acts to automate an SQLIV assessment in SQLIA. In addition, recent studies have shown that there is a need for improving the effectiveness of existing SQLIVS in order to reduce the cost of manual inspection of vulnerabilities and the risk of being attacked due to inaccurate false negative and false positive results. This research focuses on improving the effectiveness of SQLIVS by proposing an object-oriented approach in its development in order to help and minimize the incidence of false positive and false negative results, as well as to provide room for improving a proposed scanner by potential researchers. To test and validate the accuracy of research work, three vulnerable web applications were developed. Each possesses a different type of vulnerabilities and an experimental evaluation was used to validate the proposed scanner. In addition, an analytical evaluation is used to compare the proposed scanner with the existing academic scanners. The result of the experimental analysis shows significant improvement by achieving high accuracy compared to existing studies. Similarly, the analytical evaluations showed that the proposed scanner is capable of analyzing attacked page response using four different techniques. |
Author | Aliero, Muhammad Saidu Rohani, Mohd Fo’ad Ghani, Imran Qureshi, Kashif Naseer |
Author_xml | – sequence: 1 givenname: Muhammad Saidu surname: Aliero fullname: Aliero, Muhammad Saidu organization: School of Information Technology, Monash University – sequence: 2 givenname: Imran surname: Ghani fullname: Ghani, Imran organization: Indiana University of Pennsylvania – sequence: 3 givenname: Kashif Naseer orcidid: 0000-0003-3045-8402 surname: Qureshi fullname: Qureshi, Kashif Naseer email: kashifnq@gmail.com organization: Department of Computer Science, Bahria University – sequence: 4 givenname: Mohd Fo’ad surname: Rohani fullname: Rohani, Mohd Fo’ad organization: Faculty of Computing, Universiti Teknologi |
BookMark | eNp9kE1PAyEQhonRxFr7BzyReF6FZVng2DR-JY3GqGfCsmylbtkKrLH99bLWaOKhk0yGCe8zA-8JOHSdMwCcYXSBEWKXAeclzTOERcqc0Gx7AEaYlzyjuKCHv2fCjsEkhCVKQQTBGI_A_dRB1S46b-PrCjadh7WJRkfrFvDpcQ6tWw5d5-BH3zrjVWVbGzewD4OiapV-y6ruE0YTBuYUHDWqDWbyU8fg5frqeXabzR9u7mbTeaZJyWLGBK9oQWuW61KgmlVaC1HlBWNIIUqUrkUtsEgXnOSYVqjhjTEFa1RZNFwgMgbnu7lr3733abdcdr13aaXME1hQirlIKr5Tad-F4E0jtY1q-E30yrYSIzkYKHcGymSg_DZQbhOa_0PX3q6U3-yHyA4KSewWxv-9ag_1BUz1hac |
CitedBy_id | crossref_primary_10_1109_ACCESS_2023_3266385 crossref_primary_10_1108_JSIT_07_2021_0125 crossref_primary_10_1109_ACCESS_2022_3161522 crossref_primary_10_1016_j_comnet_2020_107647 crossref_primary_10_1016_j_comcom_2022_08_018 crossref_primary_10_2139_ssrn_4057341 crossref_primary_10_47836_pjst_31_3_07 crossref_primary_10_1007_s10207_023_00791_y crossref_primary_10_1109_ACCESS_2021_3050566 crossref_primary_10_1007_s12652_020_02020_z crossref_primary_10_1007_s42835_023_01541_9 crossref_primary_10_3390_s22051959 crossref_primary_10_1007_s00530_021_00771_z crossref_primary_10_1080_19393555_2021_1995537 crossref_primary_10_1016_j_scs_2020_102343 crossref_primary_10_1080_15325008_2023_2246486 crossref_primary_10_1088_1757_899X_1098_3_032105 crossref_primary_10_2139_ssrn_3915404 crossref_primary_10_1007_s13198_023_01969_2 crossref_primary_10_1016_j_apenergy_2024_122851 crossref_primary_10_3390_joitmc7010017 crossref_primary_10_1002_cta_2964 crossref_primary_10_1007_s12652_021_03316_4 crossref_primary_10_3390_su14053009 crossref_primary_10_3390_app14166929 crossref_primary_10_1007_s11227_024_06678_6 crossref_primary_10_1002_cpe_5936 |
Cites_doi | 10.1109/TSC.2014.2310221 10.1093/comjnl/bxm021 10.1109/SP.2010.27 10.1145/1135777.1135817 10.1145/1809100.1809107 10.1109/ISSRE.2012.26 10.1109/EBISS.2010.5473561 10.1109/ICSGRC.2014.6908694 10.1145/511446.511498 10.1145/1529282.1529737 10.1109/ITNG.2012.167 10.1109/ICWS.2010.76 10.1109/SCC.2011.67 10.1109/COMPSYM.2010.5685537 10.1109/ICoIA.2013.6650259 10.1007/s12652-016-0385-0 10.1007/s12652-010-0012-4 10.1109/WMNC.2017.8248850 10.1109/ICSEA.2010.85 10.1007/s12652-015-0308-5 10.1145/2610384.2610403 10.1109/LADC.2009.21 10.1145/988672.988679 10.1007/s12652-015-0269-8 10.1371/journal.pone.0117180 10.1145/2351676.2351733 10.1016/j.comnet.2005.01.003 |
ContentType | Journal Article |
Copyright | Springer-Verlag GmbH Germany, part of Springer Nature 2019 Springer-Verlag GmbH Germany, part of Springer Nature 2019. |
Copyright_xml | – notice: Springer-Verlag GmbH Germany, part of Springer Nature 2019 – notice: Springer-Verlag GmbH Germany, part of Springer Nature 2019. |
DBID | AAYXX CITATION 8FE 8FG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- P5Z P62 PHGZM PHGZT PKEHL PQEST PQGLB PQQKQ PQUKI |
DOI | 10.1007/s12652-019-01235-z |
DatabaseName | CrossRef ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central UK/Ireland Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Central Technology Collection ProQuest One Community College ProQuest Central Korea ProQuest Central Student ProQuest SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition |
DatabaseTitle | CrossRef Advanced Technologies & Aerospace Collection Computer Science Database ProQuest Central Student Technology Collection ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection ProQuest One Academic Eastern Edition SciTech Premium Collection ProQuest One Community College ProQuest Technology Collection ProQuest SciTech Collection ProQuest Central Advanced Technologies & Aerospace Database ProQuest One Applied & Life Sciences ProQuest One Academic UKI Edition ProQuest Central Korea ProQuest Central (New) ProQuest One Academic ProQuest One Academic (New) |
DatabaseTitleList | Advanced Technologies & Aerospace Collection |
Database_xml | – sequence: 1 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1868-5145 |
EndPage | 266 |
ExternalDocumentID | 10_1007_s12652_019_01235_z |
GroupedDBID | -EM 06D 0R~ 0VY 1N0 203 29~ 2JY 2VQ 30V 4.4 406 408 409 40D 96X AACDK AAHNG AAIAL AAJBT AAJKR AANZL AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH AAZMS ABAKF ABBXA ABDZT ABECU ABFTV ABHQN ABJNI ABJOX ABKCH ABMQK ABQBU ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABWNU ABXPI ACAOD ACDTI ACGFS ACHSB ACKNC ACMLO ACOKC ACPIV ACZOJ ADHHG ADHIR ADINQ ADKNI ADKPE ADRFC ADTPH ADURQ ADYFF ADZKW AEBTG AEFQL AEGNC AEJHL AEJRE AEMSY AENEX AEOHA AEPYU AESKC AETCA AEVLU AEXYK AFBBN AFKRA AFLOW AFQWF AFWTZ AFZKB AGAYW AGDGC AGJBK AGMZJ AGQEE AGQMX AGRTI AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ AKLTO ALFXC ALMA_UNASSIGNED_HOLDINGS AMKLP AMXSW AMYLF AMYQR ANMIH ARAPS AUKKA AXYYD AYJHY BENPR BGLVJ BGNMA BSONS CCPQU CSCUP DNIVK DPUIP EBLON EBS EIOEI EJD ESBYG F5P FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FYJPI GGCAI GGRSB GJIRD GQ6 GQ7 GQ8 H13 HCIFZ HF~ HG6 HMJXF HQYDN HRMNR HZ~ I0C IKXTQ IWAJR IXD IZIGR J-C J0Z JBSCW JCJTX JZLTJ K7- KOV LLZTM M4Y NPVJJ NQJWS NU0 O9- O93 O9J P2P P9P PT4 QOS R89 R9I RLLFE ROL RSV S1Z S27 S3B SEG SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE T13 TSG U2A UG4 UOJIU UTJUX UZXMN VFIZW W48 WK8 Z45 Z5O Z7R Z7X Z83 Z88 ZMTXR ~A9 AAYXX ABBRH ABDBE ABFSG ACSTC ADKFA AEZWR AFDZB AFHIU AFOHR AHPBZ AHWEU AIXLP ATHPR AYFIA CITATION PHGZM PHGZT 8FE 8FG ABRTQ AZQEC DWQXO GNUQQ JQ2 P62 PKEHL PQEST PQGLB PQQKQ PQUKI |
ID | FETCH-LOGICAL-c367t-798b545d72c690d7bcc99b24770a053acd9d919d7b83215b0f8fee47fa64f8903 |
IEDL.DBID | U2A |
ISSN | 1868-5137 |
IngestDate | Fri Jul 25 23:27:34 EDT 2025 Thu Apr 24 22:58:58 EDT 2025 Tue Jul 01 02:25:44 EDT 2025 Fri Feb 21 02:34:29 EST 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 1 |
Keywords | Black box testing SQL injection SQL injection vulnerability SQLI vulnerability scanner SQL injection attack |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c367t-798b545d72c690d7bcc99b24770a053acd9d919d7b83215b0f8fee47fa64f8903 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0003-3045-8402 |
PQID | 2919455189 |
PQPubID | 2043913 |
PageCount | 18 |
ParticipantIDs | proquest_journals_2919455189 crossref_citationtrail_10_1007_s12652_019_01235_z crossref_primary_10_1007_s12652_019_01235_z springer_journals_10_1007_s12652_019_01235_z |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 20200100 2020-1-00 20200101 |
PublicationDateYYYYMMDD | 2020-01-01 |
PublicationDate_xml | – month: 1 year: 2020 text: 20200100 |
PublicationDecade | 2020 |
PublicationPlace | Berlin/Heidelberg |
PublicationPlace_xml | – name: Berlin/Heidelberg – name: Heidelberg |
PublicationTitle | Journal of ambient intelligence and humanized computing |
PublicationTitleAbbrev | J Ambient Intell Human Comput |
PublicationYear | 2020 |
Publisher | Springer Berlin Heidelberg Springer Nature B.V |
Publisher_xml | – name: Springer Berlin Heidelberg – name: Springer Nature B.V |
References | KirazMSA comprehensive meta-analysis of cryptographic security mechanisms for cloud computingJ Ambient Intell Hum Comput20167573176010.1007/s12652-016-0385-0 Agosta G, Barenghi A, Parata A, Pelosi G (2012) Automated security analysis of dynamic web applications through symbolic code execution. In: Information Technology: new generations (ITNG), 2012 ninth international conference on, IEEE Nikto (2019) Nikto. https://sectools.org/tool/nikto/. Accessed 2019 OuchaniSLenziniGGenerating attacks in SysML activity diagrams by detecting attack surfacesJ Ambient Intell Hum Comput20156336137310.1007/s12652-015-0269-8 Antunes N, Vieira M (2011) Enhancing penetration testing with attack signatures and interface monitoring for the detection of injection vulnerabilities in web services. In: Services computing (SCC), 2011 IEEE international conference on, IEEE Bau J, Bursztein E, Gupta D, Mitchell J (2010) State of the art: automated black-box web application vulnerability testing. In: Security and privacy (SP), 2010 IEEE symposium on, IEEE Zhang X-h, Wang Z-j (2010) Notice of retraction a static analysis tool for detecting web application injection vulnerabilities for asp program. In: e-Business and information system security (EBISS), 2010 2nd international conference on, IEEE Liban A, Hilles SM (2014) Enhancing Mysql Injector vulnerability checker tool (Mysql Injector) using inference binary search algorithm for blind timing-based attack. In: Control and system graduate research Colloquium (ICSGRC), 2014 IEEE 5th, IEEE Qureshi KN, Bashir F, Abdullah AH (2017a) Real time traffic density aware road based forwarding method for vehicular ad hoc networks. In: Wireless and mobile networking conference (WMNC), 2017 10th IFIP, IEEE Antunes N, Vieira M (2012) Evaluating and improving penetration testing in web services. In: Software reliability engineering (ISSRE), 2012 IEEE 23rd international symposium on, IEEE AntunesNVieiraMAssessing and comparing vulnerability detection tools for web services: Benchmarking approach and examplesIEEE Trans Serv Comput20158226928310.1109/TSC.2014.2310221 Liu A, Yuan Y, Wijesekera D, Stavrou A (2009) SQLProb: a proxy-based architecture towards preventing SQL injection attacks. In: Proceedings of the 2009 ACM symposium on applied computing, ACM Vega Subgraph (2019) https://subgraph.com/vega/. Accessed 2019 Hassan M, Sarker K, Biswas S, Sharif M (2017) Detection of Wordpress content injection vulnerability. arXiv:1711.02447 LanginCRahimiSSoft computing in intrusion detection: the state of the artJ Ambient Intell Hum Comput20101213314510.1007/s12652-010-0012-4 YangQLiJJWeissDMA survey of coverage-based testing toolsComput J200952558959710.1093/comjnl/bxm021 Antunes N, Vieira M (2009) Detecting SQL injection vulnerabilities in web services. In: Dependable computing, 2009. LADC’09. Fourth Latin-American symposium on, IEEE AlieroMSGhaniIZainuddenSKhanMMBelloMReview on SQL injection protection methods and toolsJurnal Teknologi201577134966 PlantevinVBouzouaneABouchardBGabourySTowards a more reliable and scalable architecture for smart home environmentsJ Ambient Intell Hum Comput20182018112 Kumar P, Pateriya R (2013) DWVP: detection of web application vulnerabilities using parameters of web form. In; Proceedings of joint international conferences on CIIT ChoY-CPanJ-YDesign and implementation of website information disclosure assessment systemPloS One2015103e011718010.1371/journal.pone.0117180 QureshiKNAbdullahAHKaiwartyaOIqbalSButtRABashirFA dynamic congestion control scheme for safety applications in vehicular ad hoc networksComput Electr Eng201772774788 Livshits VB, Lam MS (2005) Finding security vulnerabilities in java applications with static analysis. In: USENIX security symposium Acunetix (2013) Accunetix vulnerability scanner Djuric Z (2013) A black-box testing tool for detecting SQL injection vulnerabilities. In: Informatics and applications (ICIA), 2013 second international conference on, IEEE TillmannNDe HalleuxJPex–white box test generation for. net. International conference on tests and proofs2008BerlinSpringer IBM (2013) IBM web application scanner Chen J-M, Wu C-L (2010) An automated vulnerability scanner for injection attack based on injection point. In: Computer symposium (ICS), 2010 international, IEEE Ciampa A, Visaggio CA, Di Penta M (2010) A heuristic-based approach for detecting SQL-injection vulnerabilities in Web applications. In: Proceedings of the 2010 ICSE workshop on software engineering for secure systems, ACM HuangY-WTsaiC-HLinT-PHuangS-KLeeDKuoS-YA testing framework for Web application security assessmentComput Netw200548573976110.1016/j.comnet.2005.01.003 QureshiKNAbdullahAHLocalization-based system challenges in vehicular ad hoc networks: surveySmartCR201446515528 Shar LK, Tan HBK (2012) Predicting common web application vulnerabilities from input validation and sanitization code patterns. In: Automated software engineering (ASE), 2012 proceedings of the 27th IEEE/ACM international conference on, IEEE Van Rijsbergen C (1979) Information retrieval. Dept. of computer science, University of Glasgow. citeseer.ist.psu.edu/vanrijsbergen79information.html. Accessed 2019 ShakhatrehAYISQL-injection vulnerability scanner using automatic creation of SQL-injection attacks (MySqlinjector)2010ChanglunUniversiti Utara Malaysia Web Application Security Consortium (2019) http://www.webappsec.org. Accessed 2019 Antunes N, Vieira M (2010) Benchmarking vulnerability detection tools for web services. In: Web services (ICWS), 2010 IEEE international conference on, IEEE Wapiti (2019) http://wapiti.sourceforge.net/. Accessed 2019 Shin Y, Williams L, Xie T (2006) Sqlunitgen: Sql injection testing using static and dynamic analysis. In: Supplemental proc. 17th IEEE international conference on software reliability engineering Singh AK, Roy S (2012) A network based vulnerability scanner for detecting sqli attacks in web applications. In: Recent advances in information technology (RAIT), 2012 1st international conference on, IEEE Zhang L, Gu Q, Peng S, Chen X, Zhao H, Chen D (2010) D-WAV: a web application vulnerabilities detection tool using Characteristics of Web Forms. In: Software engineering advances (ICSEA), 2010 fifth international conference on, IEEE Huang Y-W, Yu F, Hang C, Tsai C-H, Lee D-T, Kuo S-Y (2004) Securing web application code by static analysis and runtime protection. In: Proceedings of the 13th international conference on World Wide Web, ACM Imperva (2014) Web application attack report #5 Michael C (2005) Black box security testing tools Scott D, Sharp R (2002) Abstracting application-level web security. In: Proceedings of the 11th international conference on World Wide Web, ACM Appelt D, Nguyen CD, Briand LC, Alshahwan N (2014) Automated testing for SQL injection vulnerabilities: an input mutation approach. In: Proceedings of the 2014 international symposium on software testing and analysis, ACM Zap by Open web application security project(OWASP) (2019) https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project. Accessed 2019 CheonEHHuangZLeeYSPreventing SQL injection attack based on machine learningInt J Adv Comput Technol201359967974 AlShahwanFFaisalMAnsaGSecurity framework for RESTful mobile cloud computing Web servicesJ Ambient Intell Hum Comput20167564965910.1007/s12652-015-0308-5 Kals S, Kirda E, Kruegel C, Jovanovic N (2006) Secubat: a web vulnerability scanner. In: Proceedings of the 15th international conference on World Wide Web, ACM 1235_CR8 1235_CR7 1235_CR6 1235_CR5 1235_CR2 1235_CR1 AYI Shakhatreh (1235_CR37) 2010 1235_CR49 1235_CR45 1235_CR48 V Plantevin (1235_CR32) 2018; 2018 1235_CR47 1235_CR42 1235_CR44 1235_CR43 1235_CR40 MS Kiraz (1235_CR23) 2016; 7 Y-C Cho (1235_CR14) 2015; 10 Q Yang (1235_CR46) 2009; 52 Y-W Huang (1235_CR19) 2005; 48 1235_CR39 1235_CR38 1235_CR34 1235_CR36 1235_CR30 N Tillmann (1235_CR41) 2008 MS Aliero (1235_CR3) 2015; 77 1235_CR28 C Langin (1235_CR25) 2010; 1 1235_CR27 EH Cheon (1235_CR13) 2013; 5 1235_CR29 1235_CR24 1235_CR26 1235_CR20 N Antunes (1235_CR9) 2015; 8 1235_CR22 1235_CR21 S Ouchani (1235_CR31) 2015; 6 F AlShahwan (1235_CR4) 2016; 7 1235_CR17 1235_CR16 1235_CR18 1235_CR12 1235_CR15 KN Qureshi (1235_CR33) 2014; 4 KN Qureshi (1235_CR35) 2017; 72 1235_CR11 1235_CR10 |
References_xml | – reference: Kumar P, Pateriya R (2013) DWVP: detection of web application vulnerabilities using parameters of web form. In; Proceedings of joint international conferences on CIIT – reference: Shin Y, Williams L, Xie T (2006) Sqlunitgen: Sql injection testing using static and dynamic analysis. In: Supplemental proc. 17th IEEE international conference on software reliability engineering – reference: OuchaniSLenziniGGenerating attacks in SysML activity diagrams by detecting attack surfacesJ Ambient Intell Hum Comput20156336137310.1007/s12652-015-0269-8 – reference: Hassan M, Sarker K, Biswas S, Sharif M (2017) Detection of Wordpress content injection vulnerability. arXiv:1711.02447 – reference: Imperva (2014) Web application attack report #5 – reference: Web Application Security Consortium (2019) http://www.webappsec.org. Accessed 2019 – reference: Zap by Open web application security project(OWASP) (2019) https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project. Accessed 2019 – reference: Scott D, Sharp R (2002) Abstracting application-level web security. In: Proceedings of the 11th international conference on World Wide Web, ACM – reference: Zhang L, Gu Q, Peng S, Chen X, Zhao H, Chen D (2010) D-WAV: a web application vulnerabilities detection tool using Characteristics of Web Forms. In: Software engineering advances (ICSEA), 2010 fifth international conference on, IEEE – reference: Bau J, Bursztein E, Gupta D, Mitchell J (2010) State of the art: automated black-box web application vulnerability testing. In: Security and privacy (SP), 2010 IEEE symposium on, IEEE – reference: AlieroMSGhaniIZainuddenSKhanMMBelloMReview on SQL injection protection methods and toolsJurnal Teknologi201577134966 – reference: Liban A, Hilles SM (2014) Enhancing Mysql Injector vulnerability checker tool (Mysql Injector) using inference binary search algorithm for blind timing-based attack. In: Control and system graduate research Colloquium (ICSGRC), 2014 IEEE 5th, IEEE – reference: PlantevinVBouzouaneABouchardBGabourySTowards a more reliable and scalable architecture for smart home environmentsJ Ambient Intell Hum Comput20182018112 – reference: CheonEHHuangZLeeYSPreventing SQL injection attack based on machine learningInt J Adv Comput Technol201359967974 – reference: KirazMSA comprehensive meta-analysis of cryptographic security mechanisms for cloud computingJ Ambient Intell Hum Comput20167573176010.1007/s12652-016-0385-0 – reference: Antunes N, Vieira M (2011) Enhancing penetration testing with attack signatures and interface monitoring for the detection of injection vulnerabilities in web services. In: Services computing (SCC), 2011 IEEE international conference on, IEEE – reference: QureshiKNAbdullahAHKaiwartyaOIqbalSButtRABashirFA dynamic congestion control scheme for safety applications in vehicular ad hoc networksComput Electr Eng201772774788 – reference: QureshiKNAbdullahAHLocalization-based system challenges in vehicular ad hoc networks: surveySmartCR201446515528 – reference: Antunes N, Vieira M (2012) Evaluating and improving penetration testing in web services. In: Software reliability engineering (ISSRE), 2012 IEEE 23rd international symposium on, IEEE – reference: Appelt D, Nguyen CD, Briand LC, Alshahwan N (2014) Automated testing for SQL injection vulnerabilities: an input mutation approach. In: Proceedings of the 2014 international symposium on software testing and analysis, ACM – reference: Agosta G, Barenghi A, Parata A, Pelosi G (2012) Automated security analysis of dynamic web applications through symbolic code execution. In: Information Technology: new generations (ITNG), 2012 ninth international conference on, IEEE – reference: Wapiti (2019) http://wapiti.sourceforge.net/. Accessed 2019 – reference: Nikto (2019) Nikto. https://sectools.org/tool/nikto/. Accessed 2019 – reference: Shar LK, Tan HBK (2012) Predicting common web application vulnerabilities from input validation and sanitization code patterns. In: Automated software engineering (ASE), 2012 proceedings of the 27th IEEE/ACM international conference on, IEEE – reference: LanginCRahimiSSoft computing in intrusion detection: the state of the artJ Ambient Intell Hum Comput20101213314510.1007/s12652-010-0012-4 – reference: Vega Subgraph (2019) https://subgraph.com/vega/. Accessed 2019 – reference: TillmannNDe HalleuxJPex–white box test generation for. net. International conference on tests and proofs2008BerlinSpringer – reference: YangQLiJJWeissDMA survey of coverage-based testing toolsComput J200952558959710.1093/comjnl/bxm021 – reference: HuangY-WTsaiC-HLinT-PHuangS-KLeeDKuoS-YA testing framework for Web application security assessmentComput Netw200548573976110.1016/j.comnet.2005.01.003 – reference: Singh AK, Roy S (2012) A network based vulnerability scanner for detecting sqli attacks in web applications. In: Recent advances in information technology (RAIT), 2012 1st international conference on, IEEE – reference: Antunes N, Vieira M (2010) Benchmarking vulnerability detection tools for web services. In: Web services (ICWS), 2010 IEEE international conference on, IEEE – reference: Chen J-M, Wu C-L (2010) An automated vulnerability scanner for injection attack based on injection point. In: Computer symposium (ICS), 2010 international, IEEE – reference: Van Rijsbergen C (1979) Information retrieval. Dept. of computer science, University of Glasgow. citeseer.ist.psu.edu/vanrijsbergen79information.html. Accessed 2019 – reference: AlShahwanFFaisalMAnsaGSecurity framework for RESTful mobile cloud computing Web servicesJ Ambient Intell Hum Comput20167564965910.1007/s12652-015-0308-5 – reference: AntunesNVieiraMAssessing and comparing vulnerability detection tools for web services: Benchmarking approach and examplesIEEE Trans Serv Comput20158226928310.1109/TSC.2014.2310221 – reference: Acunetix (2013) Accunetix vulnerability scanner – reference: Huang Y-W, Yu F, Hang C, Tsai C-H, Lee D-T, Kuo S-Y (2004) Securing web application code by static analysis and runtime protection. In: Proceedings of the 13th international conference on World Wide Web, ACM – reference: Kals S, Kirda E, Kruegel C, Jovanovic N (2006) Secubat: a web vulnerability scanner. In: Proceedings of the 15th international conference on World Wide Web, ACM – reference: Michael C (2005) Black box security testing tools – reference: ChoY-CPanJ-YDesign and implementation of website information disclosure assessment systemPloS One2015103e011718010.1371/journal.pone.0117180 – reference: Qureshi KN, Bashir F, Abdullah AH (2017a) Real time traffic density aware road based forwarding method for vehicular ad hoc networks. In: Wireless and mobile networking conference (WMNC), 2017 10th IFIP, IEEE – reference: Liu A, Yuan Y, Wijesekera D, Stavrou A (2009) SQLProb: a proxy-based architecture towards preventing SQL injection attacks. In: Proceedings of the 2009 ACM symposium on applied computing, ACM – reference: Livshits VB, Lam MS (2005) Finding security vulnerabilities in java applications with static analysis. In: USENIX security symposium – reference: Djuric Z (2013) A black-box testing tool for detecting SQL injection vulnerabilities. In: Informatics and applications (ICIA), 2013 second international conference on, IEEE – reference: Zhang X-h, Wang Z-j (2010) Notice of retraction a static analysis tool for detecting web application injection vulnerabilities for asp program. In: e-Business and information system security (EBISS), 2010 2nd international conference on, IEEE – reference: Antunes N, Vieira M (2009) Detecting SQL injection vulnerabilities in web services. In: Dependable computing, 2009. LADC’09. Fourth Latin-American symposium on, IEEE – reference: ShakhatrehAYISQL-injection vulnerability scanner using automatic creation of SQL-injection attacks (MySqlinjector)2010ChanglunUniversiti Utara Malaysia – reference: IBM (2013) IBM web application scanner – reference: Ciampa A, Visaggio CA, Di Penta M (2010) A heuristic-based approach for detecting SQL-injection vulnerabilities in Web applications. In: Proceedings of the 2010 ICSE workshop on software engineering for secure systems, ACM – volume: 8 start-page: 269 issue: 2 year: 2015 ident: 1235_CR9 publication-title: IEEE Trans Serv Comput doi: 10.1109/TSC.2014.2310221 – ident: 1235_CR17 – ident: 1235_CR42 – volume: 52 start-page: 589 issue: 5 year: 2009 ident: 1235_CR46 publication-title: Comput J doi: 10.1093/comjnl/bxm021 – ident: 1235_CR11 doi: 10.1109/SP.2010.27 – ident: 1235_CR22 doi: 10.1145/1135777.1135817 – ident: 1235_CR15 doi: 10.1145/1809100.1809107 – volume: 72 start-page: 774788 year: 2017 ident: 1235_CR35 publication-title: Comput Electr Eng – ident: 1235_CR8 doi: 10.1109/ISSRE.2012.26 – ident: 1235_CR48 doi: 10.1109/EBISS.2010.5473561 – ident: 1235_CR26 doi: 10.1109/ICSGRC.2014.6908694 – volume: 2018 start-page: 1 year: 2018 ident: 1235_CR32 publication-title: J Ambient Intell Hum Comput – ident: 1235_CR47 – ident: 1235_CR36 doi: 10.1145/511446.511498 – ident: 1235_CR27 doi: 10.1145/1529282.1529737 – volume-title: Pex–white box test generation for. net. International conference on tests and proofs year: 2008 ident: 1235_CR41 – ident: 1235_CR2 doi: 10.1109/ITNG.2012.167 – volume: 77 start-page: 49 issue: 13 year: 2015 ident: 1235_CR3 publication-title: Jurnal Teknologi – ident: 1235_CR6 doi: 10.1109/ICWS.2010.76 – ident: 1235_CR43 – ident: 1235_CR7 doi: 10.1109/SCC.2011.67 – ident: 1235_CR40 – volume-title: SQL-injection vulnerability scanner using automatic creation of SQL-injection attacks (MySqlinjector) year: 2010 ident: 1235_CR37 – ident: 1235_CR12 doi: 10.1109/COMPSYM.2010.5685537 – volume: 5 start-page: 967 issue: 9 year: 2013 ident: 1235_CR13 publication-title: Int J Adv Comput Technol – ident: 1235_CR30 – ident: 1235_CR16 doi: 10.1109/ICoIA.2013.6650259 – volume: 7 start-page: 731 issue: 5 year: 2016 ident: 1235_CR23 publication-title: J Ambient Intell Hum Comput doi: 10.1007/s12652-016-0385-0 – ident: 1235_CR1 – volume: 1 start-page: 133 issue: 2 year: 2010 ident: 1235_CR25 publication-title: J Ambient Intell Hum Comput doi: 10.1007/s12652-010-0012-4 – ident: 1235_CR34 doi: 10.1109/WMNC.2017.8248850 – ident: 1235_CR29 – ident: 1235_CR21 – ident: 1235_CR49 doi: 10.1109/ICSEA.2010.85 – volume: 7 start-page: 649 issue: 5 year: 2016 ident: 1235_CR4 publication-title: J Ambient Intell Hum Comput doi: 10.1007/s12652-015-0308-5 – ident: 1235_CR44 – ident: 1235_CR10 doi: 10.1145/2610384.2610403 – ident: 1235_CR39 – volume: 4 start-page: 515 issue: 6 year: 2014 ident: 1235_CR33 publication-title: SmartCR – ident: 1235_CR5 doi: 10.1109/LADC.2009.21 – ident: 1235_CR18 doi: 10.1145/988672.988679 – volume: 6 start-page: 361 issue: 3 year: 2015 ident: 1235_CR31 publication-title: J Ambient Intell Hum Comput doi: 10.1007/s12652-015-0269-8 – volume: 10 start-page: e0117180 issue: 3 year: 2015 ident: 1235_CR14 publication-title: PloS One doi: 10.1371/journal.pone.0117180 – ident: 1235_CR28 – ident: 1235_CR45 – ident: 1235_CR24 – ident: 1235_CR20 – ident: 1235_CR38 doi: 10.1145/2351676.2351733 – volume: 48 start-page: 739 issue: 5 year: 2005 ident: 1235_CR19 publication-title: Comput Netw doi: 10.1016/j.comnet.2005.01.003 |
SSID | ssj0000393111 |
Score | 2.3283582 |
Snippet | SQL Injection Attack (SQLIA) is one of the most severe attack that can be used against web database-driven applications. Attackers use SQLIA to obtain... |
SourceID | proquest crossref springer |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 249 |
SubjectTerms | Algorithms Applications programs Artificial Intelligence Black boxes Computational Intelligence Effectiveness Engineering Java Original Research Queries Query languages Robotics and Automation Scanners Semantics Syntax User Interfaces and Human Computer Interaction |
SummonAdditionalLinks | – databaseName: ProQuest Central dbid: BENPR link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3PS8MwFA66XbyIouJ0Sg7eNLimbdKcZMrGEBn-GngrzY9OZXbTdaL7683r0hUFd04byntN8t7L974PoRNoQdOpMURLykmQeoYIahgxTLIoTAKQTgO0RZ_1BsH1U_jkCm5TB6ss98Rio9ZjBTXycypsug30YeJi8k5ANQpuV52Exjqq2y04imqoftnp394vqyzQeeoVIrxAC09Cz-euc2bRP0dZCMgEgAxRPyTz36dTFXL-uSUtDp_uFtp0USNuL9y8jdZMtoP67Qwno6H9yPz5DdvgE2sDVwJ2Bvxwd4NfstcCZ5Xhz9kIyKULHOw3Bqj7EEuo3BE5_sI5EG1kw1006HYer3rEySMQ5TOeEy4iaeMfzamyKa7mUikhJA04byV2aSVKC22NZgdAjSiUrTSyTgl4mrAgjUTL30O1bJyZfYR1JIUdt7lbwgPJUun79jGqvEgnoQ55A3mlWWLluMNBwmIUV6zHYMrYmjIuTBnPG-h0-c5kwZyx8ulmae3YraJpXPm8gc5KD1TD_892sHq2Q7RBIW0uKilNVMs_ZubIxha5PHY_0A_Mocqh priority: 102 providerName: ProQuest |
Title | An algorithm for detecting SQL injection vulnerability using black-box testing |
URI | https://link.springer.com/article/10.1007/s12652-019-01235-z https://www.proquest.com/docview/2919455189 |
Volume | 11 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT8MwDLZ4XOCAeIrxmHLgBpHWtGmaY0EbCNDEaxKcqqZJB2h0iHUI9uuJS0sBARKnHuxGlZM0tvP5M8AOlqDp1BiqFRPUSx1DJTM-Nb7yAx572DoN0RZd_6jnHV_z67IobFSh3asryeJPXRe7MZ8jjADxPczldDINs9zG7gjk6rHwI7OC1aZO0XgXqeApd1xRVsv8PMzXE6l2M7_djBYHTmcRFkpPkYTvU7sEUyZbhvlP_IEr0A0zEg_6Qxvg3z4Q634SbfBSwArJ5fkpucvuC6RVRp7HA6SXLpCwrwTB7n2iMHdH1fCF5Ei1kfVXoddpXx0c0bJBAk1cX-RUyEBZD0gLltggVwuVJFIq5gnRiu3mihMttXSkFWA_Iq5aaWCnxRNp7HtpIFvuGsxkw8ysA9GBklZuo7dYeMpPletaNZY4gY655qIBTmWkKCnZw7GJxSCqeY_RsJE1bFQYNpo0YPfjncd37ow_tbcq20flPhpFzH6-h6RxsgF71XzU4t9H2_if-ibMMQyki9zKFszkT2Ozbb2NXDVhOugcNmE2PLw5advnfrt7dtEsltwbSG3PMQ |
linkProvider | Springer Nature |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9NAEB6FcIBLVQSo6QP2QE9l1Xj9WO8BVREQUhIiIRopN9frXaeg4ATiFJIf1d_YGcdOBFJzy3nXY3l2vDszO_N9AG-oBc2k1nKjheRe6liuhA24DXQQ-rFH1GlUbdEPOgPv89Af1uCu6oWhsspqTyw2ajNJKEd-LhSG2wQfpi6mvzixRtHtakWhsTKLrl38wZBt9u7yA67vqRDtj1fvO7xkFeCJG8icSxVqdBuMFAlGhkbqJFFKC0_KZowWGSdGGXwXDhCJj6-baYjf4sk0Drw0VE0X5T6Cx56LJzl1prc_rXM61OfqFJS_BELPfceVZZ_OqltPBD7VQVCBknB9vvz3LNw4uP_dyRZHXXsf9koflbVWRvUMajZ7Dv1WxuLxCFWS3_xk6OoyY-kCAiWwb1977Hv2o6jqytjtfExQ1kXV7YJRYf2IacoTcj35y3KC9chGL2CwE7W9hHo2yewBMBNqheMYKcbS00GqXRenicQJTewbXzbAqdQSJSVSORFmjKMNxjKpMkJVRoUqo2UDztbPTFc4HVtnH1fajsp_dhZtLKwBb6sV2Aw_LO1wu7TX8KRz9aUX9S773SN4KihgL3I4x1DPf8_tCXo1uX5VmBKD613b7j302wXg |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3fS8MwEA46QfRB_InTqXnwTcPWNG2ax6GOqWMoOthbaJp0KrMb2onurzfXdesUFXy-ayiXhNwl3_cdQsdAQdOxMUQrygmLHUMENT4xvvIDL2TQOg3QFm2_2WFXXa87x-LP0O7TJ8kJpwFUmpK0OtRxtSC-Ud8DSAFgfajrkfEiWmLABrYrukPrs1sWYJ46WRNekIUnnuPynDnz8zBfT6ci5fz2SpodPo11tJZnjbg-meYNtGCSTbQ6pyW4hdr1BIf93sAW-w_P2KaiWBt4ILBGfHfbwo_JU4a6SvDbqA9S0xkq9gMD8L2HFdzjETV4xynIbiS9bdRpXNyfNUneLIFErs9TwkWgbDakOY1swau5iiIhFGWc10K70cJICy0cYQ3Qm8hTtTiwU8R4HPosDkTN3UGlZJCYXYR1oIS120ou5Ez5sXJd60YjJ9Chpz1eRs40SDLKlcShoUVfFhrIEFhpAyuzwMpxGZ3MvhlOdDT-9K5MYy_zPfUqqf19BgJyooxOp_NRmH8fbe9_7kdo-ea8IVuX7et9tEKhvs6uXCqolL6MzIFNQlJ1mK2zT3Bi0kM |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+algorithm+for+detecting+SQL+injection+vulnerability+using+black-box+testing&rft.jtitle=Journal+of+ambient+intelligence+and+humanized+computing&rft.au=Aliero%2C+Muhammad+Saidu&rft.au=Ghani%2C+Imran&rft.au=Qureshi%2C+Kashif+Naseer&rft.au=Rohani%2C+Mohd+Fo%E2%80%99ad&rft.date=2020-01-01&rft.pub=Springer+Berlin+Heidelberg&rft.issn=1868-5137&rft.eissn=1868-5145&rft.volume=11&rft.issue=1&rft.spage=249&rft.epage=266&rft_id=info:doi/10.1007%2Fs12652-019-01235-z&rft.externalDocID=10_1007_s12652_019_01235_z |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1868-5137&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1868-5137&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1868-5137&client=summon |