USING SNORT IN SQL INJECTION ATTACKS

[ 30 June 2020 | vol. 14 | no. 2 | pp. 37-46 ]

About Authors:

Hussein AlNabulsi1, Izzat Alsmadi2 and Mohammad AlJarrah3
-1,2,3Yarmouk University, Jordan

Abstract:

Network and Web attacks cause enormous threat in the current Internet world. Invaders try many techniques to get access to sensitive information for identity theft, vandalism, etc. In this paper, we evaluated a large number of possible methods to attack websites through SQL injection methods. We further experimented and evaluated several alternatives using SNORT rules to detect SQL injection attacks and prevent their access or damage. A case study and evaluation for a large number of web pages from different websites is collected and presented. Methods of detection and prevention are implemented in a way that prevent as much as possible attack approach while at the same time allow legal information to access in or out the website or the network.

Keywords:

Network Security, Vulnerability, Intrusion Detection Systems, SNORT, Vulnerability Assessment, Rule-Based Detection

 

About this Article: