0% found this document useful (0 votes)
235 views28 pages

Intrusion Detection System

This document describes an intrusion detection system project created by Gaurav Kumar, Prashant Kumar, Prashant Rajput, and Rajat Kumar Agrawal under the guidance of their project mentor Mr. Pradeep Kumar. The project aims to create a reliable technique for detecting SQL injection attacks and securing systems from being exploited. It uses both signature-based and anomaly-based methods and can trace intruders. The document outlines the software and hardware requirements, provides a literature review of existing systems, and describes the system design including SQLRand and dynamic query matching architectures. It then discusses the implementation and results before concluding that the system is an inexpensive and effective deterrent against SQL injection attacks.

Uploaded by

Gaurav Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
235 views28 pages

Intrusion Detection System

This document describes an intrusion detection system project created by Gaurav Kumar, Prashant Kumar, Prashant Rajput, and Rajat Kumar Agrawal under the guidance of their project mentor Mr. Pradeep Kumar. The project aims to create a reliable technique for detecting SQL injection attacks and securing systems from being exploited. It uses both signature-based and anomaly-based methods and can trace intruders. The document outlines the software and hardware requirements, provides a literature review of existing systems, and describes the system design including SQLRand and dynamic query matching architectures. It then discusses the implementation and results before concluding that the system is an inexpensive and effective deterrent against SQL injection attacks.

Uploaded by

Gaurav Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 28

INTRUSION DETECTION SYSTEM

BY
Gaurav Kumar(1109110035)
Prashant Kumar(1109110065)
Prashant Rajput(1109110066)
Rajat Kumar Agrawal(1109110072)

PROJECT MENTOR
MR. PRADEEP KUMAR
ASSISTANT PROFESSOR

JSS MAHAVIDYAPEETHA
JSS ACADEMY OF TECHNICAL EDUCATION, NOIDA
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING
2014-2015

Contents
1. Introduction .
2. SQL Injection .
3. Motivation
4. Objective ...
5. Scope ..
6. Software and hardware Requirements ..........
7. Literature survey...
8. System Design ...
9. Implementation and Result .
10.Conclusion..
11.References ..............

3
4
6
7
8
9
10
13
16
24
25

Introduction
Intrusion
Any unauthorized access, not permitted attempt to access/ damage or

malicious use of information resources


Intrusion detection
Detection of break-ins and break-in attempts via automated software
systems
Intrusion detection system
Defense systems, which detect and possibly prevent intrusion activities

SQL Injection
SQL Injection is a technique which allows a user specified query to execute
in the database

Due to it, unintended query runs in the database


Most of the times it also alters the original query

SQL Injection Steps


Searching for a vulnerable point
Fingerprinting the backend DB
Enumerating or retrieving data of interest table dumps,

usernames/passwords etc.
Eventual exploiting the system once the information is handy
OS take over, data change, web server take over etc.

Motivation
One of the topmost threat for web application security
Easy to detect and exploit
SQLIA have become more common, more sophisticated
Lack of common and complete methodology

Objective
Create a reliable and accurate intrusion detection technique
Secure systems from being exploited by SQL injection attacks
Trace intruder and record his details

Scope
Host-Based Intrusion Detection System
Dynamic inspection of network packets targeted at a specific host
Operating system log analysis
Network-Based Intrusion Detection System
Direct analysis of network traffic
Protocol-Based Intrusion Detection System
Detecting anomalous behavior using protocols.

Software Requirements
1. Operating System: Windows XP (x86) with Service Pack 3 all editions
except starter edition
2. Supported Architecture: 32-Bit (x86) and 64-Bit (x64)
3. Microsoft Visual Studio 2012 (and above)
4. Microsoft SQL Server 2008 R2

Hardware Requirements
1. Processor: 1.6 GHz
2. Hard Disk: 5.5 GB of free space
3. RAM: 4 GB

Literature Survey

SQL
SQL is the high-level language used in numerous relational database management systems. Developed by F.Codd at IBM in early 1970. It allows a human being to use SQL to ask for what information he wants without outlining how the information is to be retrived.

SQL Injection Attacks


AND/OR attack
SELECT ALL attack
DELETE attack
DROP attack

Existing Systems
GreenSQL
DotDefender
CodeScan Labs

System Design

SQLRand Architecture

Dynamic Query Matching Architecture

Architecture Diagram

Flow Chart

Implementation
And Result

URL Rules

No parentheses or angular brackets in the URLs


While saving or generating remove from the URLs
If you really need to have parentheses or angular brackets in the URL,
then encode them
URL should not end with two or more dashes --
While saving or generating remove these from the URLs
URL should not end with /*
While saving or generating remove these from the URLs
No schema, table or column names should be part of your URL

Conclusion
Inexpensive and effective deterrent against hacker using SQL
Injection Attack

Combines both signature based and anomaly based methods


Customizable and flexible for future purpose

References
Avizienis .A, The N-Version Approach to Fault- tolerant Software, IEEE Trans.
Software Eng., vol. SE-11, no. 12, pp. 1491-1501,Dec 2010

Aulakh, T. Intrusion Detection and Prevention System: CGI Attacks, 2009. San
Jose State University masters thesis project.

Ryan Riley, Xuxian Jiang, and Dongyan Xu AN ARCHITECTURAL


APPROACH TO PREVENTING CODE INJECTION ATTACKS, IEEE 2007

S Anderson ,A Framework for Detecting Network-based Code Injection IEEE


2005

THANK YOU

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy