Research on SQL Injection Attack and Defense Technology of Power Dispatching Data Network: Based on Data Mining

被引:1
|
作者
Sheng, Jingyuan [1 ]
机构
[1] Shenyang Univ Chem Technol, Dept Comp Sci & Technol, Shenyang 110142, Liaoning, Peoples R China
关键词
Compendex;
D O I
10.1155/2022/6207275
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the process of SQL injection attack and defense of power dispatching data network, in order to ensure the accuracy of identification and defense, it is often necessary to build a rule base. However, the scale of the temporarily constructed rule base is limited, which is easy to cause false positives and omissions. Based on the traditional defense, data mining technology is introduced to design a SQL injection attack and defense technology for power dispatching data network. First, the SQL injection attack is analyzed, and the attack flow diagram is obtained as the basis of attack identification. Using the ITFIDF algorithm in data mining technology, combined with the dataset distribution diagram of conventional words and sensitive characters, the SQL injection attack is detected. Design the SQL injection attack early warning mechanism, establish the SQL injection attack defense model, and optimize the workflow of the defense model. The performance test results show that compared with the traditional defense technology, the proposed technology has certain advantages in false alarm rate and running time.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Application Research of Data Mining Technology in Power Dispatching Management System
    Wang Ling
    Tong YuanFeng
    [J]. 2016 INTERNATIONAL CONFERENCE ON SMART GRID AND ELECTRICAL AUTOMATION (ICSGEA 2016), 2016, : 1 - 4
  • [2] SQL injection attack detection in network flow data
    Crespo-Martinez, Ignacio Samuel
    Campazas-Vega, Adrian
    Guerrero-Higueras, Angel Manuel
    Riego-DelCastillo, Virginia
    Alvarez-Aparicio, Claudia
    Fernandez-Llamas, Camino
    [J]. COMPUTERS & SECURITY, 2023, 127
  • [3] Research on SQL Injection Defense Technology Based on Deep Learning
    Shi, Weiyu
    Liu, Xiaoqian
    [J]. ARTIFICIAL INTELLIGENCE AND SECURITY, ICAIS 2022, PT II, 2022, 13339 : 538 - 549
  • [4] Research of SQL Injection Attack and Prevention Technology
    Qian, Li
    Zhu, Zhenyuan
    Hu, Lun
    Liu, Shuying
    [J]. PROCEEDINGS OF 2015 INTERNATIONAL CONFERENCE ON ESTIMATION, DETECTION AND INFORMATION FUSION ICEDIF 2015, 2015, : 303 - 306
  • [5] Data-mining based SQL injection attack detection using internal query trees
    Kim, Mi-Yeon
    Lee, Dong Hoon
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (11) : 5416 - 5430
  • [6] Research and Application of APT Attack Defense and Detection Technology Based on Big Data Technology
    Liu, Donglan
    Zhang, Hao
    Yu, Hao
    Liu, Xin
    Zhao, Yong
    Lv, Guodong
    [J]. PROCEEDINGS OF 2019 IEEE 9TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION (ICEIEC 2019), 2019, : 701 - 704
  • [7] Research on Network Intrusion Detection Technology Based on Data Mining Technology
    Zhou, Lijun
    Lv, Hong
    Zhao, Yuan
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MECHATRONICS AND INDUSTRIAL INFORMATICS, 2015, 31 : 444 - 450
  • [8] Network-based multidimensional moving target defense against false data injection attack in power system
    Hu, Yifan
    Xun, Peng
    Zhu, Peidong
    Xiong, Yinqiao
    Zhu, Yufei
    Shi, Weiheng
    Hu, Chenxi
    [J]. COMPUTERS & SECURITY, 2021, 107
  • [9] A Research for Data Mining Technology Based on Fuzzy Neural Network
    Liu, Li-na
    Qi, Hui-juan
    Li, De-xiong
    [J]. MATERIALS SCIENCE AND INFORMATION TECHNOLOGY, PTS 1-8, 2012, 433-440 : 2509 - 2512
  • [10] Research of Network Teaching Platform based on the Technology of Data Mining
    Fan, Hongjun
    Kang, Dong
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND SERVICE SYSTEM (CSSS), 2014, 109 : 331 - 334