SQL injection attack: Detection, prioritization & prevention

被引:1
|
作者
Paul, Alan [1 ]
Sharma, Vishal [1 ]
Olukoya, Oluwafemi [1 ]
机构
[1] Queens Univ Belfast, Sch Elect Elect Engn & Comp Sci, Belfast, North Ireland
关键词
SQL injection; Web application security; HTTP requests; NetFlow; Network security; Machine learning; Threat intelligence; Vulnerability prioritization; Database attack; Deep learning; Risk modelling; CNN-LSTM MODEL;
D O I
10.1016/j.jisa.2024.103871
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Web applications have become central in the digital landscape, providing users instant access to information and allowing businesses to expand their reach. Injection attacks, such as SQL injection (SQLi), are prominent attacks on web applications, given that most web applications integrate a database system. While there have been solutions proposed in the literature for SQLi attack detection using learning-based frameworks, the problem is often formulated as a binary, single-attack vector problem without considering the prioritization and prevention component of the attack. In this work, we propose a holistic solution, SQLR34P3R, that formulates the SQLi attack as a multi-class, multi-attack vector, prioritization, and prevention problem. For attack detection and classification, we gathered 457,233 samples of benign and malicious network traffic, as well as 70,023 samples that had SQLi and benign payloads. After evaluating several machine-learning- based algorithms, the hybrid CNN-LSTM models achieve an average F1-Score of 97% in web and network traffic filtering. Furthermore, by using CVEs of SQLi vulnerabilities, SQLR34P3R incorporates a novel risk analysis approach which reduces additional effort while maintaining reasonable coverage to assist businesses in allocating resources effectively by focusing on patching vulnerabilities with high exploitability. We also present an in-the-wild evaluation of the proposed solution by integrating SQLR34P3R into the pipeline of known vulnerable web applications such as Damn Vulnerable Web Application (DVWA) and Vulnado and via network traffic captured using Wireshark from SQLi DNS exfiltration conducted with SQLMap for real-time detection. Finally, we provide a comparative analysis with state-of-the-art SQLi attack detection and risk ratings solutions.
引用
收藏
页数:21
相关论文
共 50 条
  • [41] LsSQLIDP : Literature survey on SQL injection detection and prevention techniques
    Varshney, Karishma
    Ujjwal, R. L.
    JOURNAL OF STATISTICS & MANAGEMENT SYSTEMS, 2019, 22 (02): : 257 - 269
  • [42] SQL Filtering: An Effective Technique to Prevent SQL Injection Attack
    Dubey, Rhythm
    Gupta, Himanshu
    2016 5TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2016, : 312 - 317
  • [43] SQL Injection Prevention System
    Voitovych, O. P.
    Yuvkovetskyi, O. S.
    Kupershtein, L. M.
    2016 International Conference Radio Electronics & Info Communications (UkrMiCo), 2016,
  • [44] SQL INJECTION - PREVENTION AND DEFENSE
    Ljubicic, Nikolina
    Jaksic, Danijela
    Poscic, Patrizia
    ZBORNIK VELEUCILISTA U RIJECI-JOURNAL OF THE POLYTECHNICS OF RIJEKA, 2020, 8 (01): : 313 - 330
  • [45] Enhancing the Performance of SQL Injection Attack Detection through Probabilistic Neural Networks
    Alarfaj, Fawaz Khaled
    Khan, Nayeem Ahmad
    APPLIED SCIENCES-BASEL, 2023, 13 (07):
  • [46] SQL Injection Attack Detection Method using the Approximation Function of Zeta Distribution
    Oosawa, Taiki
    Matsuda, Takeshi
    2014 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC), 2014, : 819 - 824
  • [47] A survey on SQL injection attacks, detection and prevention techniques – a tertiary study
    Hallo M.
    Suntaxi G.
    International Journal of Security and Networks, 2022, 17 (03) : 193 - 202
  • [48] A Simple and Fast Technique for Detection and Prevention of SQL Injection Attacks (SQLIAs)
    Lashkaripour, Z.
    Bafghi, A. Ghaemi
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (05): : 53 - 66
  • [49] A Countermeasure to SQL Injection Attack for Cloud Environment
    Wu, Tsu-Yang
    Chen, Chien-Ming
    Sun, Xiuyang
    Liu, Shuai
    Lin, Jerry Chun-Wei
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (04) : 5279 - 5293
  • [50] A Countermeasure to SQL Injection Attack for Cloud Environment
    Tsu-Yang Wu
    Chien-Ming Chen
    Xiuyang Sun
    Shuai Liu
    Jerry Chun-Wei Lin
    Wireless Personal Communications, 2017, 96 : 5279 - 5293