• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹Á¤º¸°úÇÐȸ ³í¹®Áö > Á¤º¸°úÇÐȸ³í¹®Áö (Journal of KIISE)

Á¤º¸°úÇÐȸ³í¹®Áö (Journal of KIISE)

Current Result Document : 2 / 15 ÀÌÀü°Ç ÀÌÀü°Ç   ´ÙÀ½°Ç ´ÙÀ½°Ç

ÇѱÛÁ¦¸ñ(Korean Title) Multitier À¥ ¾îÇø®ÄÉÀÌ¼Ç È¯°æ¿¡¼­ ¾ÇÀÇÀûÀÎ SQL Query ŽÁö¸¦ À§ÇÑ HTTP Request - SQL Query ¸ÅÇÎ ±â¹ý
¿µ¹®Á¦¸ñ(English Title) HTTP Request - SQL Query Mapping Scheme for Malicious SQL Query Detection in Multitier Web Applications
ÀúÀÚ(Author) ¼­¿µ¿õ   ¹Ú½Â¿µ   Yeongung Seo   Seungyoung Park  
¿ø¹®¼ö·Ïó(Citation) VOL 44 NO. 01 PP. 0001 ~ 0012 (2017. 01)
Çѱ۳»¿ë
(Korean Abstract)
Áö¼ÓÀûÀ¸·Î Áõ°¡ÇÏ´Â ÀÎÅÍ³Ý ¼­ºñ½º ¿ä±¸»çÇ×À» ¸¸Á·Çϱâ À§ÇÏ¿© ÀÎÅÍ³Ý ¼­ºñ½º¸¦ Á¦°øÇÏ´Â ½Ã½ºÅÛÀº À¥ ¼­¹ö¿Í DB(database) ¼­¹ö·Î ±¸¼ºµÈ multitier ±¸Á¶·Î º¯È­µÇ¾î¿Ô´Ù. ÀÌ·¯ÇÑ multitier À¥ ¾îÇø®ÄÉÀÌ¼Ç È¯°æ¿¡¼­ ±âÁ¸ÀÇ IDS(intrusion detection system)´Â À¥ ¼­¹ö¿Í DB ¼­¹ö¿¡¼­ misused traffic patternµéÀ̳ª signatureµéÀ» ¸ÅĪÇÏ¿© ÀÌ¹Ì ¾Ë·ÁÁø °ø°ÝÀ» °ËÃâÇÏ°í ÇØ´ç Á¢¼ÓÀ» Â÷´ÜÇÏ´Â ¹æ½ÄÀ¸·Î µ¿ÀÛÇÑ´Ù. ÇÏÁö¸¸ ÀÌ·¯ÇÑ ¹æ½ÄÀÇ IDS´Â Á¤»óÀûÀÎ HTTP(hypertext transfer protocol) request¸¦ ÀÌ¿ëÇÏ¿© ¾ÇÀÇÀûÀ¸·Î DB¼­¹öÀÇ ³»¿ëÀÇ º¯Á¶¸¦ ½ÃµµÇÏ´Â attackerÀÇ °ø°ÝÀ» DB ¼­¹ö´Ü¿¡¼­ Á¦´ë·Î °ËÃâÇÏÁö ¸øÇÑ´Ù. ±× ÀÌÀ¯´Â DB ¼­¹ö´Â À¥ ¼­¹ö·ÎºÎÅÍ ¹ÞÀº SQL(structured query language) query°¡ ¾î¶² »ç¿ëÀÚÀÇ HTTP request¿¡ ÀÇÇØ ¹ß»ýÇÑ °ÍÀÎÁö ¾ËÁö ¸øÇÏ´Â »óÅ¿¡¼­ ó¸®Çϸç, À¥ ¼­¹ö´Â SQL query 󸮰á°úÁß ¾î¶² °ÍÀÌ ¾ÇÀÇÀûÀ¸·Î DB ¼­¹ö º¯Á¶¸¦ ½ÃµµÇÑ SQL query¿¡ ÀÇÇÑ °á°úÀÎÁö ¾Ë ¼ö ¾ø±â ¶§¹®ÀÌ´Ù. ÀÌ·± °ø°ÝÀ» °ËÃâÇϱâ À§Çؼ­´Â HTTP request¿Í SQL query »çÀÌÀÇ »óÈ£ÀÛ¿ë °ü°è¸¦ ¸íÈ®È÷ ÆľÇÇÏ°í, À̸¦ ÀÌ¿ëÇÏ¿© ¾ÇÀÇÀûÀÎ SQL query¸¦ ¹ß»ý½ÃŲ »ç¿ëÀÚ¸¦ ÃßÀûÇØ¾ß ÇÑ´Ù. À̸¦ À§Çؼ­´Â ÇØ´ç ½Ã½ºÅÛÀÇ ¼Ò½ºÄڵ带 ºÐ¼®Çϰųª application logicÀ» ¿Ïº®ÇÏ°Ô ÆľÇÇØ¾ß ÇϹǷΠÇö½ÇÀûÀ¸·Î ºÒ°¡´ÉÇÏ´Ù. º» ³í¹®¿¡¼­´Â À¥ ¼­¹ö¿Í DB ¼­¹ö¿¡¼­ Á¦°øÇÏ´Â ·Î±×¸¸À» ÀÌ¿ëÇÏ¿© ¸ðµç HTTP request¿Í SQL query°£ÀÇ mapping °ü°è¸¦ ã¾Æ³»°í, À̸¦ ÀÌ¿ëÇÏ¿© ƯÁ¤ SQL query¸¦ ¹ß»ý½ÃŲ HTTP request¸¦ ÃßÁ¤ÇÏ´Â ±â¹ýÀ» Á¦¾ÈÇÑ´Ù. ¸ðÀÇ ½ÇÇèÀ» ÅëÇÏ¿© 94%ÀÇ Á¤È®µµ·Î HTTP request¸¦ ÃßÁ¤ÇÒ ¼ö ÀÖÀ½À» È®ÀÎÇÏ¿´´Ù.
¿µ¹®³»¿ë
(English Abstract)
The continuously growing internet service requirements has resulted in a multitier system structure consisting of web server and database (DB) server. In this multitier structure, the existing intrusion detection system (IDS) detects known attacks by matching misused traffic patterns or signatures. However, malicious change to the contents at DB server through hypertext transfer protocol (HTTP) requests at the DB server cannot be detected by the IDS at the DB server¡¯s end, since the DB server processes structured query language (SQL) without knowing the associated HTTP, while the web server cannot identify the response associated with the attacker¡¯s SQL query. To detect these types of attacks, the malicious user is tracked using knowledge on interaction between HTTP request and SQL query. However, this is a practical challenge because system¡¯s source code analysis and its application logic needs to be understood completely. In this study, we proposed a scheme to find the HTTP request associated with a given SQL query using only system log files. We first generated an HTTP request-SQL query map from system log files alone. Subsequently, the HTTP request associated with a given SQL query was identified among a set of HTTP requests using this map. Computer simulations indicated that the proposed scheme finds the HTTP request associated with a given SQL query with 94% accuracy.
Å°¿öµå(Keyword) HTTP request   SQL query   user tracking   multitier web application  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå