Intrusion Detection System
Intrusion Detection System
BY
Gaurav Kumar(1109110035)
Prashant Kumar(1109110065)
Prashant Rajput(1109110066)
Rajat Kumar Agrawal(1109110072)
PROJECT MENTOR
MR. PRADEEP KUMAR
ASSISTANT PROFESSOR
JSS MAHAVIDYAPEETHA
JSS ACADEMY OF TECHNICAL EDUCATION, NOIDA
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING
2014-2015
Contents
1. Introduction .
2. SQL Injection .
3. Motivation
4. Objective ...
5. Scope ..
6. Software and hardware Requirements ..........
7. Literature survey...
8. System Design ...
9. Implementation and Result .
10.Conclusion..
11.References ..............
3
4
6
7
8
9
10
13
16
24
25
Introduction
Intrusion
Any unauthorized access, not permitted attempt to access/ damage or
SQL Injection
SQL Injection is a technique which allows a user specified query to execute
in the database
usernames/passwords etc.
Eventual exploiting the system once the information is handy
OS take over, data change, web server take over etc.
Motivation
One of the topmost threat for web application security
Easy to detect and exploit
SQLIA have become more common, more sophisticated
Lack of common and complete methodology
Objective
Create a reliable and accurate intrusion detection technique
Secure systems from being exploited by SQL injection attacks
Trace intruder and record his details
Scope
Host-Based Intrusion Detection System
Dynamic inspection of network packets targeted at a specific host
Operating system log analysis
Network-Based Intrusion Detection System
Direct analysis of network traffic
Protocol-Based Intrusion Detection System
Detecting anomalous behavior using protocols.
Software Requirements
1. Operating System: Windows XP (x86) with Service Pack 3 all editions
except starter edition
2. Supported Architecture: 32-Bit (x86) and 64-Bit (x64)
3. Microsoft Visual Studio 2012 (and above)
4. Microsoft SQL Server 2008 R2
Hardware Requirements
1. Processor: 1.6 GHz
2. Hard Disk: 5.5 GB of free space
3. RAM: 4 GB
Literature Survey
SQL
SQL is the high-level language used in numerous relational database management systems. Developed by F.Codd at IBM in early 1970. It allows a human being to use SQL to ask for what information he wants without outlining how the information is to be retrived.
Existing Systems
GreenSQL
DotDefender
CodeScan Labs
System Design
SQLRand Architecture
Architecture Diagram
Flow Chart
Implementation
And Result
URL Rules
Conclusion
Inexpensive and effective deterrent against hacker using SQL
Injection Attack
References
Avizienis .A, The N-Version Approach to Fault- tolerant Software, IEEE Trans.
Software Eng., vol. SE-11, no. 12, pp. 1491-1501,Dec 2010
Aulakh, T. Intrusion Detection and Prevention System: CGI Attacks, 2009. San
Jose State University masters thesis project.
THANK YOU