An information theoretic approach to detect SQLI Intrusion
dc.contributor.author | BOUKAROUI, HADJER | |
dc.contributor.author | Supervisor: SAOUDI, LALIA | |
dc.contributor.author | Supervisor: Fernini, Belabdelouahab | |
dc.date.accessioned | 2023-05-23T13:39:03Z | |
dc.date.available | 2023-05-23T13:39:03Z | |
dc.date.issued | 2015-06-10 | |
dc.description.abstract | SQL Injection (SQLI) is a widespread vulnerability commonly found in web-based programs. Exploitations of SQL injection vulnerabilities lead to harmful consequences such as authentication bypassing and leakage of sensitive personal information. Therefore, SQLI needs to be mitigated to protect end users. In this work, we present an approach to detect SQLI attacks based on information theory. We compute the entropy of each query present in a program accessed before program deployment. During the program execution time, when an SQL query is invoked, we compute the entropy again to identify any change in the entropy measure for that query. The approach then relies on the assumption that dynamic queries with attack inputs result in increased or decreased level of entropy. In contrast, a dynamic query with benign inputs does not result in any change of entropy value. | en_US |
dc.identifier.uri | http://dspace.univ-msila.dz:8080//xmlui/handle/123456789/38653 | |
dc.language.iso | en | en_US |
dc.publisher | University of M'sila | en_US |
dc.subject | SQL injection, software vulnerability, information theory, entropy. | en_US |
dc.title | An information theoretic approach to detect SQLI Intrusion | en_US |
dc.type | Thesis | en_US |