Title :
Enhancing Mysql Injector vulnerability checker tool (Mysql Injector) using inference binary search algorithm for blind timing-based attack
Author :
Liban, Abdilahi ; Hilles, Shadi M. S.
Author_Institution :
Fac. of Comput. & Inf. Technol., Al-Madinah Int. Univ.(Mediu), Shah Alam, Malaysia
Abstract :
Securing the database against frequent attacks is a big concern; attackers usually intend to snitch private information and damage databases. These days, web applications are widely used as a meddler between computer users. Web applications are also used mostly by e-commerce companies, and these types of applications need a secured database in order to keep sensitive and confidential information. Since Blind SQL injection attacks occurred as a new way of accessing database through the application rather than directly through the database itself, they have become popular among hackers and malicious users. Many detection tools are developed to handle this problem but they have limitations. This study enhances SQL-injection vulnerability scanning tool for automatic creation of SQL-injection attacks (MYSQL Injector) using time-based attack with Inference Binary Search Algorithm. It covers four types of blind SQL injection attacks, true/false, true error, time-based and order by attacks. This tool will automate the process of the blind SQL injection attacks to check the blind SQL injection vulnerability in the PHP-based websites that use MySQL databases. Forty four vulnerable websites and thirty non vulnerable websites were tested to ensure the accuracy of the tool. The result shows 93% accuracy for detecting the vulnerability while MySQL injector performs 84%.
Keywords :
Internet; SQL; Web sites; computer crime; electronic commerce; formal verification; search problems; MySQL databases; MySQL injector vulnerability checker tool; PHP-based Web sites; SQL-injection vulnerability scanning tool; Web applications; blind SQL injection attacks; blind timing-based attack; confidential information; e-commerce companies; hackers; inference binary search algorithm; malicious users; sensitive information; Accuracy; Control systems; Databases; HTML; Inference algorithms; Servers; Testing; SQL Injection; Web Security; blind Sql Injection;
Conference_Titel :
Control and System Graduate Research Colloquium (ICSGRC), 2014 IEEE 5th
Conference_Location :
Shah Alam
Print_ISBN :
978-1-4799-5691-3
DOI :
10.1109/ICSGRC.2014.6908694