ANALYSIS OF THE PROBLEM OF SQL-INJECTIONS IN WEB APPLICATIONS
DOI:
https://doi.org/10.28925/2663-4023.2024.25.177199Keywords:
SQL-ін’єкція; бази даних; ідентифікація та експлуатація; позасмугова SQL-атака; внутрішньосмугова SQL-атака; захищене інформаційне середовище; кібербезпека; захист інформації.Abstract
The use of web applications endows production and business processes with new qualities, primarily such as: high business mobility; availability of services; continuity of business processes; scalability of the resulting effect, etc. Taking into account all these circumstances, the issue of ensuring information security during the processing and storage of personalized and "sensitive" corporate information retains the highest priority and is an extremely relevant area of activity, both for specialists of the relevant divisions of companies (information security departments and services), and for specialized specialists the field of information security.
SQL injection is one of the most common techniques for hacking applications and websites that work with various databases. The attack, as a rule, is carried out based on the introduction of incorrect SQL operators into various types of requests, which allows the attacker to gain almost complete unauthorized access to the corresponding database, local files, as well as the possibility of remote execution of arbitrary operations on the server. Additionally, SQL attacks are often the result of unshielded input being passed to a site and used as part of a database query.
The article provides a brief overview of known techniques for hacking applications and websites that work with databases. Based on the analysis of the main types of SQL attacks, the most serious types of threats were identified. Attention was drawn to the need for periodic testing and monitoring of websites, which is an actual means of protection against SQL injections. It has been noted that the best testing method is an attempt to subject the code to SQL injection. The considered methods of protection are able to increase the overall level of security of software products against attacks of the "SQL injection" type, ensure the correct operation of applications and the integrity of user data.
The use of methods and means of testing web applications for resistance to denial-of-service attacks (DoS-attacks) is considered.
The approach presented in the article will provide an opportunity to identify vulnerabilities and potential threats that can be used by attackers for unauthorized access to web resources.
Downloads
References
Positive Technologies: Vulnerability disclosure and researcher-vendor interaction experiences in 2022–2023. (n. d.). https://www.ptsecurity.com/ru-ru/research/analytics/vulnerability-disclosure-and-researcher-vendor-interaction-experience-in-2022-2023/
Yevteev, D. (n. d.). SQL Injection from A to Ya. https://www.ptsecurity.com/upload/corporate/ru-ru/analytics/PT-devteev-Advanced-SQL-Injection.pdf
Sayenko, G., & Grinenko, T. (2019). Protecting web applications from SQL injections. “GLOBAL CYBER SECURITY FORUM 2019”. https://openarchive.nure.ua/server/api/core/bitstreams/4bc35e97-c6a3-4155-bc68-70591fe4fd27/content
Kalancha, A. A. (2023). Development of a system of protection against SQL injections using a divided registry. Modern methods of applying scientific theories: The 10th International scientific and practical conference, 457–458.
Popov, Y., Ruzuzhenko, S., & Pogorela, K. (2019). SQL injections: an overview of potential protection methods. Computer Science and Cybersecurity, 3.
Fedorenko, A. A., Osadchyi, B. I., & Korzhyk, V. V. (2023). Analysis of Methods for Detecting Vulnerabilities of Web Resources to SQL Injections. Modern information protection, 3(55). https://doi.org/10.31673/2409-7292.2023.030008
Berloh, Y., Rohovenko, A., & Dyvnych, H. (2022). Research of Methods of Automated Search of “Sql Injection” Type Vulnerabilities In Web Applications. Technical sciences and technologies, 4(30). https://doi.org/10.25140/2411-5363-2022-4(30)-113-120
Starchikov, S. (2023). Countering cyber threats in the form of SQL injections. https://medium.com/@serhii.starchikov/протидія-кібернетичним-загрозам-у-вигляді-sql-інєкцій-9bad2164fb7e
Kovalenko, A. V. (2017). Technology of Testing Vulnerability to Sql Injection. Collection of Scientific Papers “Control, Navigation and Communication Systems, 5(45), 66–71.
Yaworski, P., & Burmakin, E. (2016). Web Hacking Basics How to make money with ethical hacking Analyze over 30 paid reports! SQL injections, 97–103.
SQL injections. Verification, hacking, protection. (n. d.). https://habr.com/ru/post/130826/
Horner, M., & Hyslip, T. (2017). SQL Injection: The Longest Running Sequel in Programming History. Journal of Digital Forensics, Security and Law, 12(2). https://doi.org/10.15394/jdfsl.2017.1475
Free CDN to Speed Up and Secure WebSite. (n. d.). https://geekflare.com/free-cdn-list/
OWASP CheatSheetSeries. (n. d.). https://github.com/OWASP/CheatSheetSeries/blob/master/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.md
Best Practices to prevent SQL-injections. (n. d.). https://tableplus.io/blog/2018/08/best-practices-to-prevent-sql-injection-attacks.htm
SQL-injections: vulnerabilities and how to prevent attacks. (n. d.). https://www.veracode.com/security/sql-injection
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Катерина Терещенко, Тетяна Терещенко, Юлія Черниш , Роман Штонда, Олена Бокій
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.