Data-mining based SQL injection attack detection using internal query trees

被引:24
|
作者
Kim, Mi-Yeon [1 ]
Lee, Dong Hoon [1 ]
机构
[1] Korea Univ, Ctr Informat Secur Technol, Seoul, South Korea
关键词
Intrusion detection; SQL injection attack; Database; Data mining; SVM;
D O I
10.1016/j.eswa.2014.02.041
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Detecting SQL injection attacks (SQLIAs) is becoming increasingly important in database-driven web sites. Until now, most of the studies on SQLIA detection have focused on the structured query language (SQL) structure at the application level. Unfortunately, this approach inevitably fails to detect those attacks that use already stored procedure and data within the database system. In this paper, we propose a framework to detect SQLIAs at database level by using SVM classification and various kernel functions. The key issue of SQLIA detection framework is how to represent the internal query tree collected from database log suitable for SVM classification algorithm in order to acquire good performance in detecting SQLIAs. To solve the issue, we first propose a novel method to convert the query tree into an n-dimensional feature vector by using a multi-dimensional sequence as an intermediate representation. The reason that it is difficult to directly convert the query tree into an n-dimensional feature vector is the complexity and variability of the query tree structure. Second, we propose a method to extract the syntactic features, as well as the semantic features when generating feature vector. Third, we propose a method to transform string feature values into numeric feature values, combining multiple statistical models. The combined model maps one string value to one numeric value by containing the multiple characteristic of each string value. In order to demonstrate the feasibility of our proposals in practical environments, we implement the SQUA detection system based on PostgreSQL, a popular open source database system, and we perform experiments. The experimental results using the internal query trees of PostgreSQL validate that our proposal is effective in detecting SQLIAs, with at least 99.6% of the probability that the probability for malicious queries to be correctly predicted as SQLIA is greater than the probability for normal queries to be incorrectly predicted as SQUA. Finally, we perform additional experiments to compare our proposal with syntax-focused feature extraction and single statistical model based on feature transformation. The experimental results show that our proposal significantly increases the probability of correctly detecting SQLIAs for various SQL statements, when compared to the previous methods. (C) 2014 Elsevier Ltd. All rights reserved.
引用
收藏
页码:5416 / 5430
页数:15
相关论文
共 50 条
  • [1] Injection Attack Detection using the Removal of SQL Query Attribute Values
    Kim, Jeom Goo
    [J]. INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2011, 14 (11): : 3831 - 3841
  • [2] A novel method for SQL injection attack detection based on removing SQL query attribute values
    Lee, Inyong
    Jeong, Soonki
    Yeo, Sangsoo
    Moon, Jongsub
    [J]. MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (1-2) : 58 - 68
  • [3] Prevention of SQL Injection Attack Using Query Transformation and Hashing
    Kar, Debabrata
    Panigrahi, Suvasini
    [J]. PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2013, : 1317 - 1323
  • [4] SQL Injection Attack Detection using ResNet
    Sangeeta
    Nagasundari, S.
    Honnavali, Prasad B.
    [J]. 2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2019,
  • [5] SQL injection attack detection in network flow data
    Crespo-Martinez, Ignacio Samuel
    Campazas-Vega, Adrian
    Guerrero-Higueras, Angel Manuel
    Riego-DelCastillo, Virginia
    Alvarez-Aparicio, Claudia
    Fernandez-Llamas, Camino
    [J]. COMPUTERS & SECURITY, 2023, 127
  • [6] DATA-MINING BASED FAULT DETECTION
    Ma Hongguang Han Chongzhao (Xi’an Jiaotong University
    [J]. Journal of Electronics(China), 2005, (06) : 39 - 45
  • [7] DATA-MINING BASED FAULT DETECTION
    Ma Hongguang Han Chongzhao Xian Jiaotong University Xian China Wang Guohua Xu Jianfeng Zhu Xiaofei Research Institute of High Technology Xian China
    [J]. Journal of Electronics., 2005, (06)
  • [8] Research on SQL Injection Attack and Defense Technology of Power Dispatching Data Network: Based on Data Mining
    Sheng, Jingyuan
    [J]. MOBILE INFORMATION SYSTEMS, 2022, 2022
  • [9] THE RESEARCH AND DESIGN OF SQL PROCESSING IN A DATA-MINING SYSTEM BASED ON MAPREDUCE
    Zhang, Lei
    Li, Kaiping
    Wu, Bin
    [J]. 2011 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS, 2011, : 301 - 305
  • [10] SQL Injection Attack Detection Method using Expectation Criterion
    Xiao, Linghuan
    Matsumoto, Shinichi
    Ishikawa, Tomohisa
    Sakurai, Kouichi
    [J]. 2016 FOURTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR), 2016, : 649 - 654