Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3109761.3158395acmotherconferencesArticle/Chapter ViewAbstractPublication PagesimlConference Proceedingsconference-collections
research-article

Collaborative SQL-injections detection system with machine learning

Published: 17 October 2017 Publication History

Abstract

Data mining and information extraction from data is a field that has gained relevance in recent years thanks to techniques based on artificial intelligence and use of machine and deep learning. The main aim of the present work is the development of a tool based on a previous behaviour study of security audit tools (oriented to SQL pentesting) with the purpose of creating testing sets capable of performing an accurate detection of a SQL attack. The study is based on the information collected through the generated web server logs in a pentesting laboratory environment. Then, making use of the common extracted patterns from the logs, each attack vector has been classified in risk levels (dangerous attack, normal attack, non-attack, etc.). Finally, a training with the generated data was performed in order to obtain a classifier system that has a variable performance between 97 and 99 percent in positive attack detection. The training data is shared to other servers in order to create a distributed network capable of deciding if a query is an attack or is a real petition and inform to connected clients in order to block the petitions from the attacker's IP.

References

[1]
2017. Exploit DataBase {online}. https://www.exploit-db.com. (July 14, 2017).
[2]
2017. Firebase - Google Inc. {online}. https://firebase.google.com/. (July 10, 2017).
[3]
2017. Packet Storm {online}. https://goo.gl/X3v37z. (July 9, 2017).
[4]
2017. SQL Map {online}. http://sqlmap.org/. (July 10, 2017).
[5]
2017. WASP Top 10 {online}. https://www.owasp.org/index.php/Top_10_2017-Top_10. (July 10, 2017).
[6]
2017. Wired - WannaCry {online}. https://www.wired.com/tag/wannacry/. (July 11, 2017).
[7]
Gregory Buehrer, Bruce W Weide, and Paolo AG Sivilotti. 2005. Using parse tree validation to prevent SQL injection attacks. In Proceedings of the 5th international workshop on Software engineering and middleware. ACM, 106--113.
[8]
J. Choi, H. Kim, C. Choi, and P. Kim. 2011. Efficient Malicious Code Detection Using N-Gram Analysis and SVM. In 2011 14th International Conference on Network-Based Information Systems. 618--621.
[9]
William GJ Halfond and Alessandro Orso. 2005. AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks. In Proceedings of the 20th IEEE/ACM international Conference on Automated software engineering. ACM, 174--183.
[10]
R. Komiya, I. Paik, and M. Hisada. 2011. Classification of malicious web code by machine learning. In 2011 3rd International Conference on Awareness Science and Technology (iCAST). 406--411.
[11]
A. Makiou, Y. Begriche, and A. Serhrouchni. 2014. Improving Web Application Firewalls to detect advanced SQL injection attacks. In 2014 10th International Conference on Information Assurance and Security. 35--40.
[12]
Michio Sonoda, Takeshi Matsuda, and Daiki Koizumi. 2016. On the approximate maximum likelihood estimation in stochastic model of SQL injection attacks. In Systems, Man, and Cybernetics (SMC), 2016 IEEE International Conference on. IEEE, 000802--000807.
[13]
Atefeh Tajpour, Suhaimi Ibrahim, and Maslin Masrom. 2011. SQL injection detection and prevention techniques. International Journal of Advancements in Computing Technology 3, 7 (2011), 82--91.

Cited By

View all
  • (2024)Detecting Structured Query Language Injections in Web Microservices Using Machine LearningInformatics10.3390/informatics1102001511:2(15)Online publication date: 2-Apr-2024
  • (2023)Artificial Intelligence-Based Model for Data Security and Mitigation Against SQL Injection Attacks in Web Applications2023 International Conference on Electrical, Computer and Energy Technologies (ICECET)10.1109/ICECET58911.2023.10389469(1-7)Online publication date: 16-Nov-2023
  • (2023)Input Validation Vulnerabilities in Web Applications: Systematic Review, Classification, and Analysis of the Current State-of-the-ArtIEEE Access10.1109/ACCESS.2023.326638511(40128-40161)Online publication date: 2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
IML '17: Proceedings of the 1st International Conference on Internet of Things and Machine Learning
October 2017
581 pages
ISBN:9781450352437
DOI:10.1145/3109761
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 17 October 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. SQL injection
  2. SQLIA
  3. attack
  4. internet
  5. machine learning classification
  6. security
  7. training data

Qualifiers

  • Research-article

Conference

IML 2017

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)30
  • Downloads (Last 6 weeks)1
Reflects downloads up to 03 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Detecting Structured Query Language Injections in Web Microservices Using Machine LearningInformatics10.3390/informatics1102001511:2(15)Online publication date: 2-Apr-2024
  • (2023)Artificial Intelligence-Based Model for Data Security and Mitigation Against SQL Injection Attacks in Web Applications2023 International Conference on Electrical, Computer and Energy Technologies (ICECET)10.1109/ICECET58911.2023.10389469(1-7)Online publication date: 16-Nov-2023
  • (2023)Input Validation Vulnerabilities in Web Applications: Systematic Review, Classification, and Analysis of the Current State-of-the-ArtIEEE Access10.1109/ACCESS.2023.326638511(40128-40161)Online publication date: 2023
  • (2022)Database Meets Artificial Intelligence: A SurveyIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2020.299464134:3(1096-1116)Online publication date: 1-Mar-2022
  • (2021)Security and Privacy Challenges of Deep LearningResearch Anthology on Privatizing and Securing Data10.4018/978-1-7998-8954-0.ch059(1258-1280)Online publication date: 2021
  • (2021)AI Meets Database: AI4DB and DB4AIProceedings of the 2021 International Conference on Management of Data10.1145/3448016.3457542(2859-2866)Online publication date: 9-Jun-2021
  • (2021)An Efficient SQL Injection Detection System Using Deep Learning2021 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE)10.1109/ICCIKE51210.2021.9410674(442-445)Online publication date: 17-Mar-2021
  • (2021)Research on SQL Injection Detection Model Based on CNN2021 International Conference on Intelligent Computing, Automation and Applications (ICAA)10.1109/ICAA53760.2021.00028(111-114)Online publication date: Jun-2021
  • (2020)Security and Privacy Challenges of Deep LearningDeep Learning Strategies for Security Enhancement in Wireless Sensor Networks10.4018/978-1-7998-5068-7.ch003(42-64)Online publication date: 2020
  • (2020)Detecting SQL Injection Attacks in Cloud SaaS using Machine Learning2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS)10.1109/BigDataSecurity-HPSC-IDS49724.2020.00035(145-150)Online publication date: May-2020
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media