2011 First International Conference on Robot, Vision and Signal Processing 2011
DOI: 10.1109/rvsp.2011.59
|View full text |Cite
|
Sign up to set email alerts
|

TransSQL: A Translation and Validation-Based Solution for SQL-injection Attacks

Abstract: SQL injection attacks, a class of injection flaw in which specially crafted input strings leads to illegal queries to databases, are one of the topmost threats to web applications. A number of research prototypes and commercial products that maintain the queries structure in web applications have been developed. But these techniques either fail to address the full scope of the problem or have limitations. Based on our observation that the injected string in a SQL injection attack is interpreted differently on … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(20 citation statements)
references
References 10 publications
0
20
0
Order By: Relevance
“…Authors in paper [7] proposed a translation and validation-based solution for SQLi attacks, TransSQL, where SQL requests are automatically translated to Lightweight Directory Access Protocol (LDAP)-equivalent requests. SQL and LDAP-equivalent queries are then executed on SQL database and LDAP database, respectively.…”
Section: Related Work For Sql Injection Attacksmentioning
confidence: 99%
“…Authors in paper [7] proposed a translation and validation-based solution for SQLi attacks, TransSQL, where SQL requests are automatically translated to Lightweight Directory Access Protocol (LDAP)-equivalent requests. SQL and LDAP-equivalent queries are then executed on SQL database and LDAP database, respectively.…”
Section: Related Work For Sql Injection Attacksmentioning
confidence: 99%
“…So the system shows the result as Null. The major shortcoming of this models that it is not applicable for injection queries which contain instances, alias, UNION and UNIONALL [11]. In [9], tokenization method is proposed, which is efficient but applied on original as well as query with injection is not possible for all queries that their original query is already stored.…”
Section: Original Querymentioning
confidence: 99%
“…Table 4 shows all the pros and cons of previous model in the field of SQL Injection Attack. Table illustrated below compares five models Sania: [7], SBSQLID [8], RDUD [9], TransSQL [11] and Tokenization [10] on the basis of their advantages and drawbacks.…”
Section: Query Tokenizationmentioning
confidence: 99%
See 1 more Smart Citation
“…The underlying idea of this technique is that any SQLIA will alter the structure of the original SQL statement and by detecting the difference in the structures, a SQLIA can be identified. [9] Kai-Xiang Zhang, Chia-Jun Lin, et.al proposed a translation and validation(TransSQL) based approach for detecting and preventing SQL Injection attacks. The basic idea of this approach relies on how different databases interpret SQL queries and those SQL queries with injection.…”
Section: Literature Surveymentioning
confidence: 99%