Efficient Detection Of SQL Injection Attack(SQLIA) Using Pattern-based Neural Network Model

被引:3
|
作者
Begum, Meharaj A. [1 ]
Arock, Michael [1 ]
机构
[1] Natl Inst Technol, Bioinformat & Parallel Comp Lab, Dept Comp Applicat, Trichy, Tamil Nadu, India
关键词
Cyber Attack; SQLIA; Parsing; Tagged Patterns; MLP;
D O I
10.1109/ICCCIS51004.2021.9397066
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Web application vulnerability is one of the major causes of cyber attacks. Cyber criminals exploit these vulnerabilities to inject malicious commands to the unsanitized user input in order to bypass authentication of the database through some cyber-attack techniques like cross site scripting (XSS), phishing, Structured Query Language Injection Attack (SQLIA), malware etc., Although many research works have been conducted to resolve the above mentioned attacks, only few challenges with respect to SQLIA could be resolved. Ensuring security against complete set of malicious payloads are extremely complicated and demanding. It requires appropriate classification of legitimate and injected SQL commands. The existing approaches dealt with limited set of signatures, keywords and symbols of SQL queries to identify the injected queries. This work focuses on extracting SQL injection patterns with the help of existing parsing and tagging techniques. Pattern-based tags are trained and modeled using Multi-layer Perceptron which significantly performs well in classification of queries with accuracy of 94.4% which is better than the existing approaches.
引用
收藏
页码:343 / 347
页数:5
相关论文
共 50 条
  • [1] SQL Injection Attack Detection Using Fingerprints and Pattern Matching Technique
    Appiah, Benjamin
    Opoku-Mensah, Eugene
    Qin, Zhiguang
    [J]. PROCEEDINGS OF 2017 8TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2017), 2017, : 583 - 587
  • [2] Detection of SQL injection based on artificial neural network
    Tang, Peng
    Qiu, Weidong
    Huang, Zheng
    Lian, Huijuan
    Liu, Guozhen
    [J]. KNOWLEDGE-BASED SYSTEMS, 2020, 190
  • [3] AN EFFICIENT TECHNIQUE FOR PREVENTING SQL INJECTION ATTACK USING PATTERN MATCHING ALGORITHM
    Prabakar, M. Amutha
    KarthiKeyan, M.
    Marimuthu, K.
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN COMPUTING, COMMUNICATION AND NANOTECHNOLOGY (ICE-CCN'13), 2013, : 503 - 506
  • [4] Neural network based single index evaluation for SQL injection attack detection in health care data
    Nagabhooshanam, N.
    ganapathy, N. Bala sundara
    Ravindra Murthy, C.
    Mohammed Saleh, Al Ansari
    CosioBorda, Ricardo Fernando
    [J]. Measurement: Sensors, 2023, 27
  • [5] An Efficient Technique for Detection and Prevention of SQL Injection Attack using ASCII Based String Matching
    Balasundaram, Indrani
    Ramaraj, E.
    [J]. INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY AND SYSTEM DESIGN 2011, 2012, 30 : 183 - 190
  • [6] SQL injection attack detection in network flow data
    Crespo-Martinez, Ignacio Samuel
    Campazas-Vega, Adrian
    Guerrero-Higueras, Angel Manuel
    Riego-DelCastillo, Virginia
    Alvarez-Aparicio, Claudia
    Fernandez-Llamas, Camino
    [J]. COMPUTERS & SECURITY, 2023, 127
  • [7] SQL Injection Attack Detection using ResNet
    Sangeeta
    Nagasundari, S.
    Honnavali, Prasad B.
    [J]. 2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2019,
  • [8] Detection Model for SQL Injection Attack: An Approach for Preventing a Web Application from the SQL Injection Attack
    Buja, Geogiana
    Bin Abd Jalil, Kamarularifin
    Ali, Fakariah Bt Hj Mohd
    Rahman, Teh Faradilla Abdul
    [J]. 2014 IEEE SYMPOSIUM ON COMPUTER APPLICATIONS AND INDUSTRIAL ELECTRONICS (ISCAIE), 2014,
  • [9] Modified Parse-Tree Based Pattern Extraction Approach for Detecting SQLIA Using Neural Network Model
    Begum, A. Meharaj
    Arock, Michael
    [J]. ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 16 (01): : 1 - 16
  • [10] Deep Neural Network-Based SQL Injection Detection Method
    Zhang, Wei
    Li, Yueqin
    Li, Xiaofeng
    Shao, Minggang
    Mi, Yajie
    Zhang, Hongli
    Zhi, Guoqing
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022