A Novel Approach Exploiting Machine Learning to Detect SQLi Attacks

Ahmed Abadulla Ashlam, A. Badii, Frederic T. Stahl
{"title":"A Novel Approach Exploiting Machine Learning to Detect SQLi Attacks","authors":"Ahmed Abadulla Ashlam, A. Badii, Frederic T. Stahl","doi":"10.1109/IC_ASET53395.2022.9765948","DOIUrl":null,"url":null,"abstract":"The increasing use of Information Technology applications in the distributed environment is increasing security exploits. Information about vulnerabilities is also available on the open web in an unstructured format that developers can take advantage of to fix vulnerabilities in their IT applications. SQL injection (SQLi) attacks are frequently launched with the objective of exfiltration of data typically through targeting the back-end server organisations to compromise their customer databases. There have been a number of high profile attacks against large enterprises in recent years. With the ever-increasing growth of online trading, it is possible to see how SQLi attacks can continue to be one of the leading routes for cyber-attacks in the future, as indicated by findings reported in OWASP. Various machine learning and deep learning algorithms have been applied to detect and prevent these attacks. However, such preventive attempts have not limited the incidence of cyber-attacks and the resulting compromised database as reported by (CVE) repository. In this paper, the potential of using data mining approaches is pursued in order to enhance the efficacy of SQL injection safeguarding measures by reducing the false-positive rates in SQLi detection. The proposed approach uses CountVectorizer to extract features and then apply various supervised machine-learning models to automate the classification of SQLi. The model that returns the highest accuracy has been chosen among available models. Also a new model has been created PALOSDM (Performance analysis and Iterative optimisation of the SQLI Detection Model) for reducing false-positive rate and false-negative rate. The detection rate accuracy has also been improved significantly from a baseline of 94% up to 99%.","PeriodicalId":6874,"journal":{"name":"2022 5th International Conference on Advanced Systems and Emergent Technologies (IC_ASET)","volume":"32 1","pages":"513-517"},"PeriodicalIF":0.0000,"publicationDate":"2022-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 5th International Conference on Advanced Systems and Emergent Technologies (IC_ASET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC_ASET53395.2022.9765948","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

The increasing use of Information Technology applications in the distributed environment is increasing security exploits. Information about vulnerabilities is also available on the open web in an unstructured format that developers can take advantage of to fix vulnerabilities in their IT applications. SQL injection (SQLi) attacks are frequently launched with the objective of exfiltration of data typically through targeting the back-end server organisations to compromise their customer databases. There have been a number of high profile attacks against large enterprises in recent years. With the ever-increasing growth of online trading, it is possible to see how SQLi attacks can continue to be one of the leading routes for cyber-attacks in the future, as indicated by findings reported in OWASP. Various machine learning and deep learning algorithms have been applied to detect and prevent these attacks. However, such preventive attempts have not limited the incidence of cyber-attacks and the resulting compromised database as reported by (CVE) repository. In this paper, the potential of using data mining approaches is pursued in order to enhance the efficacy of SQL injection safeguarding measures by reducing the false-positive rates in SQLi detection. The proposed approach uses CountVectorizer to extract features and then apply various supervised machine-learning models to automate the classification of SQLi. The model that returns the highest accuracy has been chosen among available models. Also a new model has been created PALOSDM (Performance analysis and Iterative optimisation of the SQLI Detection Model) for reducing false-positive rate and false-negative rate. The detection rate accuracy has also been improved significantly from a baseline of 94% up to 99%.
利用机器学习检测SQLi攻击的新方法
在分布式环境中越来越多地使用信息技术应用程序增加了安全漏洞。有关漏洞的信息也可以在开放网络上以非结构化格式提供,开发人员可以利用这些信息来修复其IT应用程序中的漏洞。SQL注入(SQLi)攻击经常以泄露数据为目标,通常是通过攻击后端服务器组织来破坏其客户数据库。近年来发生了多起针对大型企业的高调攻击事件。随着在线交易的不断增长,我们可以看到SQLi攻击如何继续成为未来网络攻击的主要途径之一,正如OWASP报告的发现所表明的那样。各种机器学习和深度学习算法已被应用于检测和预防这些攻击。然而,这种预防性尝试并没有限制网络攻击的发生率,也没有限制(CVE)存储库报告的导致数据库受损的事件。本文探讨了数据挖掘方法的潜力,通过降低SQL注入检测中的误报率来提高SQL注入防护措施的有效性。提出的方法使用CountVectorizer提取特征,然后应用各种监督机器学习模型对SQLi进行自动分类。在可用的模型中选择返回精度最高的模型。此外,还创建了一个新的模型PALOSDM(性能分析和迭代优化的SQLI检测模型),以降低假阳性率和假阴性率。检测准确率也从基线的94%提高到99%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信