Efficient Detection Of SQL Injection Attack(SQLIA) Using Pattern-based Neural Network Model

被引:3
|
作者
Begum, Meharaj A. [1 ]
Arock, Michael [1 ]
机构
[1] Natl Inst Technol, Bioinformat & Parallel Comp Lab, Dept Comp Applicat, Trichy, Tamil Nadu, India
关键词
Cyber Attack; SQLIA; Parsing; Tagged Patterns; MLP;
D O I
10.1109/ICCCIS51004.2021.9397066
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Web application vulnerability is one of the major causes of cyber attacks. Cyber criminals exploit these vulnerabilities to inject malicious commands to the unsanitized user input in order to bypass authentication of the database through some cyber-attack techniques like cross site scripting (XSS), phishing, Structured Query Language Injection Attack (SQLIA), malware etc., Although many research works have been conducted to resolve the above mentioned attacks, only few challenges with respect to SQLIA could be resolved. Ensuring security against complete set of malicious payloads are extremely complicated and demanding. It requires appropriate classification of legitimate and injected SQL commands. The existing approaches dealt with limited set of signatures, keywords and symbols of SQL queries to identify the injected queries. This work focuses on extracting SQL injection patterns with the help of existing parsing and tagging techniques. Pattern-based tags are trained and modeled using Multi-layer Perceptron which significantly performs well in classification of queries with accuracy of 94.4% which is better than the existing approaches.
引用
收藏
页码:343 / 347
页数:5
相关论文
共 50 条
  • [21] Using Explainable AI for Neural Network-Based Network Attack Detection
    Zou, Qingtian
    Zhang, Lan
    Sun, Xiaoyan
    Singhal, Anoop
    Liu, Peng
    [J]. COMPUTER, 2024, 57 (05) : 78 - 85
  • [22] Pattern-Based Model Transformation Using QVT
    Park, Sunuk
    Kim, Dae-Kyoo
    Park, Sooyong
    [J]. 2012 19TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC), VOL 1, 2012, : 472 - 481
  • [23] A novel tree pattern-based violence detection model using audio signals
    Yildiz, Arif Metehan
    Barua, Prabal D.
    Dogan, Sengul
    Baygin, Mehmet
    Tuncer, Turker
    Ooi, Chui Ping
    Fujita, Hamido
    Acharya, U. Rajendra
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2023, 224
  • [24] Network Attack Detection Based on Neural Network LSTM
    Sun, Zichao
    Lyu, Peilin
    [J]. 2019 2ND INTERNATIONAL CONFERENCE ON MECHANICAL, ELECTRONIC AND ENGINEERING TECHNOLOGY (MEET 2019), 2019, : 1 - 6
  • [25] SQL Injection Attack Detection Method using the Approximation Function of Zeta Distribution
    Oosawa, Taiki
    Matsuda, Takeshi
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC), 2014, : 819 - 824
  • [26] Optimized neural network model for attack detection in LTE network
    Jyothi, K. Krishna
    Chaudhari, Shilpa
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2020, 88
  • [27] Pattern-based reasoning system using self-incremental neural network for propositional logic
    Sudo, Akihito
    Tsuboyama, Manabu
    Zhang, Chenli
    Sato, Akihiro
    Hasegawa, Osamu
    [J]. NEURAL INFORMATION PROCESSING, PART I, 2008, 4984 : 338 - 347
  • [28] Artificial neural network based web application firewall for SQL injection
    Moosa, Asaad
    [J]. World Academy of Science, Engineering and Technology, 2010, 40 : 12 - 21
  • [29] Deep Learning in Cybersecurity: A Hybrid BERT-LSTM Network for SQL Injection Attack Detection
    Liu, Yixian
    Dai, Yupeng
    [J]. IET INFORMATION SECURITY, 2024, 2024
  • [30] A neural network model for the detection of pattern motion
    Jin, Z. Fei
    Yang, G.
    [J]. PERCEPTION, 1990, 19 (04) : 402 - 403