Anomaly SQL SELECT-Statement Detection Using Entropy Analysis

被引:0
|
作者
Threepak, Thanunchai [1 ]
Watcharapupong, Akkradach [1 ]
机构
[1] King Mongkuts Inst Technol Ladkrabang, Fac Engn, Dept Comp Engn, Bangkok, Thailand
关键词
Database Security; SQL Injection; Anomaly Detection; Entropy Analysis;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Database systems are often intruded because they store valuable information and can be accessed through Internet web applications which sometimes are not developed with security in mind. Attackers can inject some crafted inputs to those programs that work on database systems so that some unexpected results occur. We analyze the database system log files, focus on query statements (SQL SELECT statements), using the Shannon entropy to detect such anomaly attempts that would change conditional entropy significantly. Our experiment shows that the proposed anomaly detection using entropy analysis is effective.
引用
收藏
页码:301 / 309
页数:9
相关论文
共 50 条
  • [1] Querying the data warehouse with the SQL procedure SELECT statement
    Lafler, KP
    PROCEEDINGS OF THE TWENTY-THIRD ANNUAL SAS USERS GROUP INTERNATIONAL CONFERENCE, 1998, : 245 - 249
  • [2] Network anomaly detection using nonextensive entropy
    Ziviani, Artur
    Gomes, Antonio Tadeu A.
    Monsores, Marcelo L.
    Rodrigues, Paulo S. S.
    IEEE COMMUNICATIONS LETTERS, 2007, 11 (12) : 1034 - 1036
  • [3] Network Anomaly Detection Using Parameterized Entropy
    Berezinski, Przemyslaw
    Szpyrka, Marcin
    Jasiul, Bartosz
    Mazur, Michal
    COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT, CISIM 2014, 2014, 8838 : 465 - 478
  • [4] Magnetic anomaly detection using entropy filter
    Sheinker, Arie
    Salomonski, Nizan
    Ginzburg, Boris
    Frumkis, Lev
    Kaplan, Ben-Zion
    MEASUREMENT SCIENCE AND TECHNOLOGY, 2008, 19 (04)
  • [5] Analysis of flow-based anomaly detection using Shannon's entropy
    Komazec, Teodora
    Gajin, Slavko
    2019 27TH TELECOMMUNICATIONS FORUM (TELFOR 2019), 2019, : 41 - 44
  • [6] Anomaly Detection in Paleoclimate Records Using Permutation Entropy
    Garland, Joshua
    Jones, Tyler R.
    Neuder, Michael
    Morris, Valerie
    White, James W. C.
    Bradley, Elizabeth
    ENTROPY, 2018, 20 (12):
  • [7] A performance study of anomaly detection using entropy method
    Waskita, A. A.
    Suhartanto, H.
    Handoko, L. T.
    2016 INTERNATIONAL CONFERENCE ON COMPUTER, CONTROL, INFORMATICS, AND ITS APPLICATIONS (IC3INA) - RECENT PROGRESS IN COMPUTER, CONTROL, AND INFORMATICS FOR DATA SCIENCE, 2016, : 137 - 140
  • [8] Anomaly Detection System using Entropy based Technique
    Gautam, Sunil Kumar
    Om, Hari
    2015 1ST INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2015, : 738 - 743
  • [9] An Evolutionary Approach to Test SELECT SQL Statements Using Mutation Analysis
    Moncao, A. C.
    Camilo Junior, C. G.
    Queiroz, L. T.
    Rodrigues, C. L.
    Leitao Junior, P. S.
    Vincenzi, A. M.
    Araujo, A. A.
    Dantas, A.
    de Souza, J. T.
    IEEE LATIN AMERICA TRANSACTIONS, 2017, 15 (06) : 1128 - 1136
  • [10] Characterising Payload Entropy in Packet Flows—Baseline Entropy Analysis for Network Anomaly Detection
    Kenyon, Anthony
    Deka, Lipika
    Elizondo, David
    Future Internet, 2024, 16 (12):