Moving Target Defense in Preventing SQL Injection

Kaiyu Feng, Xiao Gu, Wei Peng, Dequan Yang*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Citations (Scopus)

Abstract

The database stores important information about the user, which make it a core part of the website. Therefore, database injection has become a serious cyber-attack. Traditional database injection defenses are passive defenses, which cannot detect new vulnerability before it is exposed. The Moving Target Defense (MTD) method that emerged in recent years has become a breakthrough to solve this problem. This paper mainly establishes the model to verify the possibility of dynamic defense application in database injection defense. This paper first introduces the related concepts SQLI and MTD, then we build models to compare the attack surface of the traditional static defense model and MTD one. It is concluded that with certain conditions, the dynamic defense model has a smaller attack surface, which indicate stronger defense ability.

Original languageEnglish
Title of host publicationArtificial Intelligence and Security - 5th International Conference, ICAIS 2019, Proceedings
EditorsXingming Sun, Zhaoqing Pan, Elisa Bertino
PublisherSpringer Verlag
Pages25-34
Number of pages10
ISBN (Print)9783030242671
DOIs
Publication statusPublished - 2019
Event5th International Conference on Artificial Intelligence and Security, ICAIS 2019 - New York city, United States
Duration: 26 Jul 201928 Jul 2019

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume11635 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference5th International Conference on Artificial Intelligence and Security, ICAIS 2019
Country/TerritoryUnited States
CityNew York city
Period26/07/1928/07/19

Keywords

  • Container
  • Moving target defense
  • SQL injection

Fingerprint

Dive into the research topics of 'Moving Target Defense in Preventing SQL Injection'. Together they form a unique fingerprint.

Cite this