Nothing Special   »   [go: up one dir, main page]

Skip to main content

An Efficient Approach Toward Security of Web Application Using SQL Attack Detection and Prevention Technique

  • Conference paper
  • First Online:
Inventive Computation and Information Technologies

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 336))

  • 1069 Accesses

Abstract

SQL injection attacks are widely used by the imposters due to its less complexity and high flexibility. The proposed methodology is intended to perform detection and prevention of such malware scripted SQL queries using SVM. The model first trained with various malware strings and then tested with unknown scripts. It also performs prevention of web application from the SQL malware string using string analyzer and dynamic candidate evaluation. The string analyzer is a grammar-based algorithm that locates the context on the string using regular grammar. Dynamic candidate solution is used to dynamically identifies the malware script using review policy network in which it first generate the parse tree of the input query and then it analyze each node of the tree. It also finds the variation of detection time with respect to accuracy. For the prevention system, simplicity calculates ratio of prevented attack queries out of total number of input queries. The accuracy of the model is good and also the fault rate is minimal.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. R. Muhammad, R. Muhammad, R. Bashir, S. Habib, Detection and prevention of SQL injection attack by dynamic analyzer and testing model. Int. J. Adv. Comput. Sci. Appl. 8(8), 209–214 (2017). https://doi.org/10.14569/ijacsa.2017.080827

    Article  Google Scholar 

  2. A. Ciampa, C.A. Visaggio, M. Di Penta, A heuristic-based approach for detecting SQL-injection vulnerabilities in web applications, in Proceedings of International Conference on Software Engineering (2010), pp. 43–49. https://doi.org/10.1145/1809100.1809107

  3. P. Bisht, P. Madhusudan, V.N. Venkatakrishnan, CANDID: dynamic candidate evaluations for automatic prevention of SQL injection attacks. ACM Trans. Inf. Syst. Secur. 13(2), 1–38 (2010). https://doi.org/10.1145/1698750.1698754

    Article  Google Scholar 

  4. R.A. McClure, I.H. Krüger, SQL DOM: compile time checking of dynamic SQL statements, in Proceedings of 27th International Conference on Software Engineering ICSE05 (2005), pp. 88–96. https://doi.org/10.1109/icse.2005.1553551

  5. G. Buehrer, B.W. Weide, P.A.G. Sivilotti, Using parse tree validation to prevent SQL injection attacks, in SEM 2005—Proceedings of 5th International Workshop on Software Engineering and Middleware, Sept 2005, pp. 106–113. https://doi.org/10.1145/1108473.1108496

  6. W.G.J. Halfond, A. Orso, Preventing SQL code injection by combining static and runtime analysis. Distribution (2008)

    Google Scholar 

  7. B.A. Pham, V.H. Subburaj, An experimental setup for detecting SQLi attacks using machine learning algorithms. J. Colloq. Inf. Syst. Secur. Educ. 8(1), 1–13 (2020). [Online]. Available: https://cisse.info/journal/index.php/cisse/article/view/124

  8. P.S. Naidu, R. Kharat, Security in Computing and Communications, vol. 625 (2016)

    Google Scholar 

  9. M. Alenezi, M. Nadeem, R. Asif, SQL injection attacks countermeasures assessments. Indones. J. Electr. Eng. Comput. Sci. 21(2), 1121–1131 (2020). https://doi.org/10.11591/ijeecs.v21.i2.pp1121-1131

    Article  Google Scholar 

  10. Y. Kosuga, A study on dynamic detection of web application vulnerabilities, Aug 2011, p. 113

    Google Scholar 

  11. S.O. Uwagbole, W.J. Buchanan, L. Fan, An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack, in Proceedings of 2017 7th International Conference on Emerging Security Technologies EST 2017, Sept 2017, pp. 12–17. https://doi.org/10.1109/EST.2017.8090392

  12. S.W. Boyd, A.D. Keromytis, SQLrand: preventing SQL injection attacks, in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 3089 (2004), pp. 292–302. https://doi.org/10.1007/978-3-540-24852-1_21

  13. M.S. Aliero, A.A. Ardo, I. Ghani, M. Atiku, Classification of SQL injection detection and prevention measure. IOSR J. Eng. 06(02), 6–17 (2016). [Online]. Available: www.iosrjen.org

  14. D. Appelt, N. Alshahwan, L. Briand, Assessing the impact of firewalls and database proxies on SQL injection testing, in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 8432, Nov 2013 (2014), pp. 32–47. https://doi.org/10.1007/978-3-319-07785-7_2

  15. W.G.J. Halfond, A. Orso, AMNESIA: analysis and monitoring for neutralizing SQL-injection attacks, in 20th IEEE/ACM International Conference on Automated Software Engineering ASE 2005 (2005), pp. 174–183. https://doi.org/10.1145/1101908.1101935

  16. Z. Su, G. Wassermann, The essence of command injection attacks in web applications, in Conference Record of the Annual ACM Symposium on Principles of Programming Languages (2006), pp. 372–382. https://doi.org/10.1145/1111037.1111070

  17. C. Gould, Z. Su, P. Devanbu, JDBC checker: a static analysis tool for SQL/JDBC applications, in Proceedings of International Conference on Software Engineering, vol. 26 (2004), pp. 697–698. https://doi.org/10.1109/icse.2004.1317494

  18. S. Panda, S. Ramani, Protection of web application against SQL injection attacks. Int. J. Mod. Eng. Res. 3(1), 166–168 (2013)

    Google Scholar 

  19. N. Shah, Securing Database Users from the Threat of SQL Injection Attacks (2017). [Online]. Available: http://digitalrepository.smu.edu

  20. A. Joshi, V. Geetha, SQL injection detection using machine learning, in 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies ICCICCT 2014, no. 2 (2014), pp. 1111–1115. https://doi.org/10.1109/ICCICCT.2014.6993127

  21. D.S. Shakya, D.S. Smys, Anomalies detection in fog computing architectures using deep learning. J. Trends Comput. Sci. Smart Technol. 2(1), 46–55 (2020). https://doi.org/10.36548/jtcsst.2020.1.005

  22. D. Sivaganesan, Novel influence maximization algorithm for social network behavior management. J. ISMAC 3(1), 60–68 (2021). https://doi.org/10.36548/jismac.2021.1.006

  23. S.R. Mugunthan, T. Vijayakumar, Design of improved version of sigmoidal function with biases for classification task in ELM domain. J. Soft Comput. Paradig. 3(2), 70–82 (2021). https://doi.org/10.36548/jscp.2021.2.002

  24. R. Bastola, S. Shakya, Developing domain ontology for issuing certificate of citizenship of Nepal. J. Inf. Technol. Digit. World 2(2), 73–90 (2020). https://doi.org/10.36548/jitdw.2020.2.001

    Article  Google Scholar 

  25. A. Ladole, D. Phalke, SQL injection attack and user behavior detection by using query tree, fisher score and SVM classification. Int. Res. J. Eng. Technol. 03(06), 1505–1509 (2016)

    Google Scholar 

  26. M. Hasan, Z. Balbahaith, M. Tarique, Detection of SQL injection attacks: a machine learning approach, in 2019 International Conference on Electrical and Computing Technologies and Applications ICECTA 2019 (2019). https://doi.org/10.1109/ICECTA48151.2019.8959617

  27. N. YawAsabere, W. Kwawu Torgby, Structured query language injection (SQLI) attacks: detection and prevention techniques in web application technologies. Int. J. Comput. Appl. 71(11), 29–39 (2013). https://doi.org/10.5120/12404-8908

  28. D. Appelt, Automated security testing of web-based systems against SQL injection attacks (SOFIA), June 2016, p. 140

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bharati, V., Kumar, A. (2022). An Efficient Approach Toward Security of Web Application Using SQL Attack Detection and Prevention Technique. In: Smys, S., Balas, V.E., Palanisamy, R. (eds) Inventive Computation and Information Technologies. Lecture Notes in Networks and Systems, vol 336. Springer, Singapore. https://doi.org/10.1007/978-981-16-6723-7_58

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-6723-7_58

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-6722-0

  • Online ISBN: 978-981-16-6723-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics