2023
DOI: 10.3390/fi15050170
|View full text |Cite
|
Sign up to set email alerts
|

Toward an SDN-Based Web Application Firewall: Defending against SQL Injection Attacks

Abstract: Web attacks pose a significant threat to enterprises, as attackers often target web applications first. Various solutions have been proposed to mitigate and reduce the severity of these threats, such as web application firewalls (WAFs). On the other hand, software-defined networking (SDN) technology has significantly improved network management and operation by providing centralized control for network administrators. In this work, we investigated the possibility of using SDN to implement a firewall capable of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 32 publications
(41 reference statements)
0
6
0
Order By: Relevance
“…Lu et al 12 Alotaibi et al 13 Patidar et al 14 Liu et al 15 Alghawazi et al 16 Saini et al 17 Sheth et al 18 Okesola et al 19 Labib et al 20 Marashdih et al 21 Mehta et al 22 Henry et al 23 Pruzinec et al 24 Irungu et al 25 Fratty et al 26 Logozzo et al 27 Singh et al 28 Crespo-Martínez et al 29 Fu et al 30 Philip et al 31 Barsellotti et al 32 Mallissery et al 33 Lu et al 12 Alotaibi et al 13 Guan et al 34 Nasrullayev et al 35 Muhammad et al 36 Brintha et al 37 Al Badri et al [36] Lu et al 12 (2023)…”
Section: Parse Tree Validation Policy Enforcement Isr Taint Tracking ...mentioning
confidence: 99%
“…Lu et al 12 Alotaibi et al 13 Patidar et al 14 Liu et al 15 Alghawazi et al 16 Saini et al 17 Sheth et al 18 Okesola et al 19 Labib et al 20 Marashdih et al 21 Mehta et al 22 Henry et al 23 Pruzinec et al 24 Irungu et al 25 Fratty et al 26 Logozzo et al 27 Singh et al 28 Crespo-Martínez et al 29 Fu et al 30 Philip et al 31 Barsellotti et al 32 Mallissery et al 33 Lu et al 12 Alotaibi et al 13 Guan et al 34 Nasrullayev et al 35 Muhammad et al 36 Brintha et al 37 Al Badri et al [36] Lu et al 12 (2023)…”
Section: Parse Tree Validation Policy Enforcement Isr Taint Tracking ...mentioning
confidence: 99%
“…By injecting malignant SQL queries into user-supplied data, attackers can exploit the network's policies, compromise the integrity of network flows, and gain unapproved access to sensitive data. SDN architectures should apply robust security measures, such as IDS-based ML, to prevent this threat [20].…”
Section: Sql Injectionmentioning
confidence: 99%
“…DL-based approaches are particularly effective in identifying unknown or zero-day attacks. However, they often require a large amount of labelled training data and computational resources [20].…”
Section: Anomaly -Based Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…In order to maintain security from SQLi attacks, mitigation needs to be implemented as a very important step taken to reduce the risk and impact of SQLi attacks on an application or system (22). The main goal of SQLi mitigation is to prevent attackers from successfully injecting malicious SQL commands into an application or system, so that sensitive data is not exposed or corrupted (23). One effective way of mitigation is to install a firewall layer on the website (24).…”
Section: Introductionmentioning
confidence: 99%