Model Query Tokenization and Character Matching A
Model Query Tokenization and Character Matching A
net/publication/315302951
CITATION READS
1 168
3 authors, including:
Anil Kumar
Indian Institute of Information Technology Allahabad
14 PUBLICATIONS 26 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Anil Kumar on 10 April 2017.
13
International Journal of Computer Applications (0975 – 8887)
Volume 162 – No 9, March 2017
authors have to match this incoming query only to those belong. Suppose the authors get this query from that action
model queries which belongs to that action point. point which the authors have discussed in the previous
section.
select ID from Employee where EmpName = “vats” and
EmpPwd = “vatsChy”
To find an ordered sequence of token in that singly link list
for an incoming query to the database the authors first
separate the tokens from the query by a SQL parser of the
specific DBMS. After parsing those into tokens, on the basis
of space by using code, convert these string tokens into sum
of its ASCII Code value of each character. For example
consider the keyword „select‟, the corresponding ASCII
decimal values for the literals is s = 115, e = 101, l = 108, e =
101, c = 99, t = 116, so adding the ASCII value of each
literals the authors get the corresponding integer value of
„select‟ is 640.
select = 115 + 101 + 108 + 101 + 99 + 116 = 640
After getting the ASCII value of all strings of a query the
authors store into in the form of linked list. If the authors
closely analyze any web application most of the cases similar
Figure 2.1: finding of Action Point type of query is used with different user input. To store a valid
individual query structure, the authors preserve the sequence
In the figure 2.1, red part of the code indicates that action of tokens generated by the query using a singly link list where
point. An action point is defined as a point in the application each node store a single token of a query. After token
code that issues SQL queries to the underlying database. separation and integer conversion the authors get the ordered
There is one query model for each action point. For each sequence of the tokens of the query then the authors start
Action Point the authors generate a query model that searching the singly link list.
represent all the possible queries generated by that Action
Point and store the length of all possible model queries in an
array. There is one array for each Action Point.
14
International Journal of Computer Applications (0975 – 8887)
Volume 162 – No 9, March 2017
15
International Journal of Computer Applications (0975 – 8887)
Volume 162 – No 9, March 2017
3. RESULT ANALYSIS
16
International Journal of Computer Applications (0975 – 8887)
Volume 162 – No 9, March 2017
17
International Journal of Computer Applications (0975 – 8887)
Volume 162 – No 9, March 2017
[3] Jaskanwal Minhas, Raman Kumar. Blocking of SQL [10] F. Valeur, D. Mutz, and G. Vigna. A Learning-Based
Injection attack by Comparing Static and Dynamic Approach to the Detection of SQL Attacks. In
queries. International Journal of computer network and Proceedings of the Conference on Detection of
Information Security 2013. Intrusions and Malware and Vulnerability Assessment
(DIMVA), pages 123–140, 2005.
[4] A. Dasgupta, V. Narasayya, M. Syamala. A Static
Analysis Framework for Database Applications. IEEE [11] Boyd and A. Keromytis. SQLrand: Preventing SQL
25th International Conference on Data Engineering. injection attacks. In Proceedings of the Applied
Pages 1403 – 1414, March 2009. Cryptography and Network Security (ACNS), pages 292–
304, 2004.
[5] W. Halfond, J. Viegas and A. Orso. A Classification of
SQL Injection Attacks and Countermeasures, [12] G. Wassermann and Z. Su. An Analysis Framework for
Proceedings of the IEEE International Symposium on Security in Web Applications. In Proceedings of the FSE
Secure Software Engineering (ISSSE), 2006 Workshop on Specification and Verification of
Component-Based Systems (SAVCBS), pages 70–78,
[6] W. G. Halfond and A. Orso. AMNESIA: Analysis and 2004.
Monitoring for NEutralizing SQL-Injection Attacks. In
Proceedings of the IEEE and ACM International [13] Kumar, Anil, and Rahul Kala. "Linear Temporal Logic-
based Mission Planning." IJIMAI 3.7 (2016): 32-41.
IJCATM : www.ijcaonline.org
18