Connect with us

Hi, what are you looking for?


Application Security

DB Networks Introduces Appliance to Block SQL Injection Attacks

DB Networks, a database security company, has introduced a new security appliance that provides an Intrusion Detection System (IDS) specifically designed to detect and block SQL injection attacks.

DB Networks, a database security company, has introduced a new security appliance that provides an Intrusion Detection System (IDS) specifically designed to detect and block SQL injection attacks.

According to the company, its new IDS-6300 appliance leverages “behavioral analysis in the database tier” for SQL injection intrusion detection and defense.

The IDS-6300 combines behavioral analysis and continuous database monitoring, addressing specific compliance requirements within regulations such as PCI DSS, HIPAA, GLBA, and NIST spec 800-53, the company said.

DB Networks IDS-6300While SQL injection attacks are not complex in nature, they continue to threaten sensitive data stored in enterprise databases.

According to research from IBM’s X-Force team, SQL injection was the most commonly used attack leading to a successful breach during the first half of 2013, noting that 26 percent of the hundreds of breaches it examined this year were linked to SQL injection.

DB Networks says the way its technology works is different than other solutions such as traditional Web Application Firewalls (WAFs).

“Current techniques using signatures and black listing require time-consuming and error-prone manual updating, and are not effective against database hackers who obfuscate their SQL injection using Advanced Evasion Techniques (AET) to conceal their attacks,” DB Networks explained.

“The way the DB Networks technology analyzes transactions is fundamentally different than a signature based technology so the capacity to identify an anomaly is significantly higher with greater accuracy against false positives,” said David Monahan, Research Director of Security and Risk Management, Enterprise Management Associates, Inc.

DB Networks says its new Core IDS solution’s continuous monitoring also adds the unique benefit of database discovery for organizations. Also, its ability to parse and analyze SQL statements offers organizations unique insight into the SQL statements being created by their applications. Coding issues are rapidly identified and traced to their source where they can be remediated.

Advertisement. Scroll to continue reading.

How it works

The IDS-6300 works passively in the core of the IT infrastructure and is operationally transparent, the company said. The appliance creates multiple unique models of how an application creates the SQL statements that it sends to the database and evaluates all statements against these models for proper behavior. Any SQL statement that deviates from these unique models causes the system to alarm in real-time. The behavioral learning and model creation is automated, making it much faster and more accurate than manually generated signatures or the tuning of signatures to suppress false alarms.

The solution is delivered in an easy-to-install intelligent security appliance, which is installed on the network connecting the application server to the database server. Accoding to the security firm, a typical set up takes less than an hour and it usually takes a day or two for the IDS-6300 to establish all learning and models.

The IDS-6300 appliance is available immediately with pricing starting at $25,000.

Related: SQL Injection Attacks on the Rise 

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment


Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn about active threats targeting common cloud deployments and what security teams can do to mitigate them.


Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.


The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

GitHub this week announced the revocation of three certificates used for the GitHub Desktop and Atom applications.