{"title":"使用机器学习算法检测SQL注入攻击","authors":"T. Muhammad, Hamayoon Ghafory","doi":"10.58496/mjcs/2022/002","DOIUrl":null,"url":null,"abstract":"One of the most widely recognised cyber-assaults against web-based application weaknesses is the\nstructured query language injection attack (SQLIA), which is utilised to execute unlawful information\ncontrol language, evade confirmation strategies, and access confined information. Some published\nsystematic reviews were considered in this area. Older and more current papers in the field are often\nincluded in more recent systematic reviews. As a result, all of the publications we looked at were\nrecent. I used data from 2012 to 2020 for the present analysis. There are a few techniques and systems\nfor identifying and forestalling SQLIA, including encryption, XML, design coordinating, parsing, and\nmachine learning. Guarded coding is utilised to apply Machine Learning (ML) procedure, which has\nbeen shown to be significant for SQLIA alleviation. The machine learning approach needs a ton of\ninformation to prepare models really and support a few attack types. An extremely difficult visually\nimpaired SQL injection attack might be relieved utilizing ML procedures. An exploratory\nexamination of Logistic Regression (LRN), Stochastic Gradient Descent (SDG), Sequential Minimal\nOptimization (SMO), Bayes Network (BNK), Instance-Based Learner (IBK), Multilayer Perceptron\n(MLP), Naive Bayes (NBS), and J48 was completed in the Waikato Climate for Information\nInvestigation. The presentation of the regulated learning grouping calculations was surveyed utilizing\nWait (70%) and 10-crease Cross Validation appraisal methods to decide the best calculation.\nAccording to the findings of the Cross Validation approach, SMO, IBK, and J48 had accuracy values\nof 98.7785%, 98.4285%, and 98.2985%, respectively, while the Hold-Out technique revealed\naccuracy values of 98.7956%, 98.1526%, and 100 for SMO, IBK, and J48. In contrast, IBK and J48\nneeded 10.15 seconds, 0.06 seconds, and 14.12 seconds, respectively, to create their models using the\nCross Validation approach SMO, whereas they needed 9.71 seconds, 0.16 seconds, and 14.28\nseconds, respectively, to develop their models using the Hold-Out technique SMO. According to the\nresults, IBK was selected as the classifier for SQLIA detection and prevention since it required the\nleast amount of time to develop a model using the Cross Validation approach and performed better\nthan other candidates in terms of accuracy, sensitivity, and specificity. For the best algorithm selection\nfor predictive analytics, various performance assessment measures are also crucial in addition to\naccuracy.","PeriodicalId":369414,"journal":{"name":"Mesopotamian Journal of Cyber Security","volume":"175 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"SQL Injection Attack Detection Using Machine Learning Algorithm\",\"authors\":\"T. Muhammad, Hamayoon Ghafory\",\"doi\":\"10.58496/mjcs/2022/002\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"One of the most widely recognised cyber-assaults against web-based application weaknesses is the\\nstructured query language injection attack (SQLIA), which is utilised to execute unlawful information\\ncontrol language, evade confirmation strategies, and access confined information. Some published\\nsystematic reviews were considered in this area. Older and more current papers in the field are often\\nincluded in more recent systematic reviews. As a result, all of the publications we looked at were\\nrecent. I used data from 2012 to 2020 for the present analysis. There are a few techniques and systems\\nfor identifying and forestalling SQLIA, including encryption, XML, design coordinating, parsing, and\\nmachine learning. Guarded coding is utilised to apply Machine Learning (ML) procedure, which has\\nbeen shown to be significant for SQLIA alleviation. The machine learning approach needs a ton of\\ninformation to prepare models really and support a few attack types. An extremely difficult visually\\nimpaired SQL injection attack might be relieved utilizing ML procedures. An exploratory\\nexamination of Logistic Regression (LRN), Stochastic Gradient Descent (SDG), Sequential Minimal\\nOptimization (SMO), Bayes Network (BNK), Instance-Based Learner (IBK), Multilayer Perceptron\\n(MLP), Naive Bayes (NBS), and J48 was completed in the Waikato Climate for Information\\nInvestigation. The presentation of the regulated learning grouping calculations was surveyed utilizing\\nWait (70%) and 10-crease Cross Validation appraisal methods to decide the best calculation.\\nAccording to the findings of the Cross Validation approach, SMO, IBK, and J48 had accuracy values\\nof 98.7785%, 98.4285%, and 98.2985%, respectively, while the Hold-Out technique revealed\\naccuracy values of 98.7956%, 98.1526%, and 100 for SMO, IBK, and J48. In contrast, IBK and J48\\nneeded 10.15 seconds, 0.06 seconds, and 14.12 seconds, respectively, to create their models using the\\nCross Validation approach SMO, whereas they needed 9.71 seconds, 0.16 seconds, and 14.28\\nseconds, respectively, to develop their models using the Hold-Out technique SMO. According to the\\nresults, IBK was selected as the classifier for SQLIA detection and prevention since it required the\\nleast amount of time to develop a model using the Cross Validation approach and performed better\\nthan other candidates in terms of accuracy, sensitivity, and specificity. For the best algorithm selection\\nfor predictive analytics, various performance assessment measures are also crucial in addition to\\naccuracy.\",\"PeriodicalId\":369414,\"journal\":{\"name\":\"Mesopotamian Journal of Cyber Security\",\"volume\":\"175 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-02-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Mesopotamian Journal of Cyber Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.58496/mjcs/2022/002\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Mesopotamian Journal of Cyber Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.58496/mjcs/2022/002","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
摘要
针对基于web的应用程序弱点的最广泛认可的网络攻击之一是结构化查询语言注入攻击(SQLIA),它用于执行非法信息控制语言,逃避确认策略和访问受限信息。在这方面考虑了一些已发表的系统综述。该领域较老的和最新的论文经常被纳入较新的系统综述。因此,我们研究的所有出版物都是最近的。我使用了2012年到2020年的数据进行分析。有一些技术和系统可以识别和预防SQLIA,包括加密、XML、设计协调、解析和机器学习。保护编码用于应用机器学习(ML)程序,这已被证明对缓解SQLIA具有重要意义。机器学习方法需要大量的信息来准备模型,并支持几种攻击类型。一个极其困难的视觉受损的SQL注入攻击可以利用ML过程来缓解。在Waikato Climate for InformationInvestigation中完成了逻辑回归(LRN)、随机梯度下降(SDG)、顺序最小优化(SMO)、贝叶斯网络(BNK)、基于实例的学习器(IBK)、多层感知器(MLP)、朴素贝叶斯(NBS)和J48的探索性检验。利用等待(70%)和10-折痕交叉验证评估方法调查了调节学习分组计算的呈现,以确定最佳计算。交叉验证的结果显示,SMO、IBK和J48的准确率分别为98.7785%、98.4285%和98.2985%,而Hold-Out技术对SMO、IBK和J48的准确率分别为98.7956%、98.1526%和100。相比之下,IBK和j48使用交叉验证方法SMO分别需要10.15秒、0.06秒和14.12秒来创建模型,而使用Hold-Out技术SMO分别需要9.71秒、0.16秒和14.28秒来开发模型。根据结果,IBK被选为SQLIA检测和预防的分类器,因为它需要最少的时间来开发一个使用交叉验证方法的模型,并且在准确性、灵敏度和特异性方面比其他候选分类器表现更好。对于预测分析的最佳算法选择,除了准确性之外,各种性能评估指标也至关重要。
SQL Injection Attack Detection Using Machine Learning Algorithm
One of the most widely recognised cyber-assaults against web-based application weaknesses is the
structured query language injection attack (SQLIA), which is utilised to execute unlawful information
control language, evade confirmation strategies, and access confined information. Some published
systematic reviews were considered in this area. Older and more current papers in the field are often
included in more recent systematic reviews. As a result, all of the publications we looked at were
recent. I used data from 2012 to 2020 for the present analysis. There are a few techniques and systems
for identifying and forestalling SQLIA, including encryption, XML, design coordinating, parsing, and
machine learning. Guarded coding is utilised to apply Machine Learning (ML) procedure, which has
been shown to be significant for SQLIA alleviation. The machine learning approach needs a ton of
information to prepare models really and support a few attack types. An extremely difficult visually
impaired SQL injection attack might be relieved utilizing ML procedures. An exploratory
examination of Logistic Regression (LRN), Stochastic Gradient Descent (SDG), Sequential Minimal
Optimization (SMO), Bayes Network (BNK), Instance-Based Learner (IBK), Multilayer Perceptron
(MLP), Naive Bayes (NBS), and J48 was completed in the Waikato Climate for Information
Investigation. The presentation of the regulated learning grouping calculations was surveyed utilizing
Wait (70%) and 10-crease Cross Validation appraisal methods to decide the best calculation.
According to the findings of the Cross Validation approach, SMO, IBK, and J48 had accuracy values
of 98.7785%, 98.4285%, and 98.2985%, respectively, while the Hold-Out technique revealed
accuracy values of 98.7956%, 98.1526%, and 100 for SMO, IBK, and J48. In contrast, IBK and J48
needed 10.15 seconds, 0.06 seconds, and 14.12 seconds, respectively, to create their models using the
Cross Validation approach SMO, whereas they needed 9.71 seconds, 0.16 seconds, and 14.28
seconds, respectively, to develop their models using the Hold-Out technique SMO. According to the
results, IBK was selected as the classifier for SQLIA detection and prevention since it required the
least amount of time to develop a model using the Cross Validation approach and performed better
than other candidates in terms of accuracy, sensitivity, and specificity. For the best algorithm selection
for predictive analytics, various performance assessment measures are also crucial in addition to
accuracy.