使用机器学习算法检测SQL注入攻击

T. Muhammad, Hamayoon Ghafory
{"title":"使用机器学习算法检测SQL注入攻击","authors":"T. Muhammad, Hamayoon Ghafory","doi":"10.58496/mjcs/2022/002","DOIUrl":null,"url":null,"abstract":"One of the most widely recognised cyber-assaults against web-based application weaknesses is the\nstructured query language injection attack (SQLIA), which is utilised to execute unlawful information\ncontrol language, evade confirmation strategies, and access confined information. Some published\nsystematic reviews were considered in this area. Older and more current papers in the field are often\nincluded in more recent systematic reviews. As a result, all of the publications we looked at were\nrecent. I used data from 2012 to 2020 for the present analysis. There are a few techniques and systems\nfor identifying and forestalling SQLIA, including encryption, XML, design coordinating, parsing, and\nmachine learning. Guarded coding is utilised to apply Machine Learning (ML) procedure, which has\nbeen shown to be significant for SQLIA alleviation. The machine learning approach needs a ton of\ninformation to prepare models really and support a few attack types. An extremely difficult visually\nimpaired SQL injection attack might be relieved utilizing ML procedures. An exploratory\nexamination of Logistic Regression (LRN), Stochastic Gradient Descent (SDG), Sequential Minimal\nOptimization (SMO), Bayes Network (BNK), Instance-Based Learner (IBK), Multilayer Perceptron\n(MLP), Naive Bayes (NBS), and J48 was completed in the Waikato Climate for Information\nInvestigation. The presentation of the regulated learning grouping calculations was surveyed utilizing\nWait (70%) and 10-crease Cross Validation appraisal methods to decide the best calculation.\nAccording to the findings of the Cross Validation approach, SMO, IBK, and J48 had accuracy values\nof 98.7785%, 98.4285%, and 98.2985%, respectively, while the Hold-Out technique revealed\naccuracy values of 98.7956%, 98.1526%, and 100 for SMO, IBK, and J48. In contrast, IBK and J48\nneeded 10.15 seconds, 0.06 seconds, and 14.12 seconds, respectively, to create their models using the\nCross Validation approach SMO, whereas they needed 9.71 seconds, 0.16 seconds, and 14.28\nseconds, respectively, to develop their models using the Hold-Out technique SMO. According to the\nresults, IBK was selected as the classifier for SQLIA detection and prevention since it required the\nleast amount of time to develop a model using the Cross Validation approach and performed better\nthan other candidates in terms of accuracy, sensitivity, and specificity. For the best algorithm selection\nfor predictive analytics, various performance assessment measures are also crucial in addition to\naccuracy.","PeriodicalId":369414,"journal":{"name":"Mesopotamian Journal of Cyber Security","volume":"175 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"SQL Injection Attack Detection Using Machine Learning Algorithm\",\"authors\":\"T. Muhammad, Hamayoon Ghafory\",\"doi\":\"10.58496/mjcs/2022/002\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"One of the most widely recognised cyber-assaults against web-based application weaknesses is the\\nstructured query language injection attack (SQLIA), which is utilised to execute unlawful information\\ncontrol language, evade confirmation strategies, and access confined information. Some published\\nsystematic reviews were considered in this area. Older and more current papers in the field are often\\nincluded in more recent systematic reviews. As a result, all of the publications we looked at were\\nrecent. I used data from 2012 to 2020 for the present analysis. There are a few techniques and systems\\nfor identifying and forestalling SQLIA, including encryption, XML, design coordinating, parsing, and\\nmachine learning. Guarded coding is utilised to apply Machine Learning (ML) procedure, which has\\nbeen shown to be significant for SQLIA alleviation. The machine learning approach needs a ton of\\ninformation to prepare models really and support a few attack types. An extremely difficult visually\\nimpaired SQL injection attack might be relieved utilizing ML procedures. An exploratory\\nexamination of Logistic Regression (LRN), Stochastic Gradient Descent (SDG), Sequential Minimal\\nOptimization (SMO), Bayes Network (BNK), Instance-Based Learner (IBK), Multilayer Perceptron\\n(MLP), Naive Bayes (NBS), and J48 was completed in the Waikato Climate for Information\\nInvestigation. The presentation of the regulated learning grouping calculations was surveyed utilizing\\nWait (70%) and 10-crease Cross Validation appraisal methods to decide the best calculation.\\nAccording to the findings of the Cross Validation approach, SMO, IBK, and J48 had accuracy values\\nof 98.7785%, 98.4285%, and 98.2985%, respectively, while the Hold-Out technique revealed\\naccuracy values of 98.7956%, 98.1526%, and 100 for SMO, IBK, and J48. In contrast, IBK and J48\\nneeded 10.15 seconds, 0.06 seconds, and 14.12 seconds, respectively, to create their models using the\\nCross Validation approach SMO, whereas they needed 9.71 seconds, 0.16 seconds, and 14.28\\nseconds, respectively, to develop their models using the Hold-Out technique SMO. According to the\\nresults, IBK was selected as the classifier for SQLIA detection and prevention since it required the\\nleast amount of time to develop a model using the Cross Validation approach and performed better\\nthan other candidates in terms of accuracy, sensitivity, and specificity. For the best algorithm selection\\nfor predictive analytics, various performance assessment measures are also crucial in addition to\\naccuracy.\",\"PeriodicalId\":369414,\"journal\":{\"name\":\"Mesopotamian Journal of Cyber Security\",\"volume\":\"175 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-02-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Mesopotamian Journal of Cyber Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.58496/mjcs/2022/002\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Mesopotamian Journal of Cyber Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.58496/mjcs/2022/002","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

针对基于web的应用程序弱点的最广泛认可的网络攻击之一是结构化查询语言注入攻击(SQLIA),它用于执行非法信息控制语言,逃避确认策略和访问受限信息。在这方面考虑了一些已发表的系统综述。该领域较老的和最新的论文经常被纳入较新的系统综述。因此,我们研究的所有出版物都是最近的。我使用了2012年到2020年的数据进行分析。有一些技术和系统可以识别和预防SQLIA,包括加密、XML、设计协调、解析和机器学习。保护编码用于应用机器学习(ML)程序,这已被证明对缓解SQLIA具有重要意义。机器学习方法需要大量的信息来准备模型,并支持几种攻击类型。一个极其困难的视觉受损的SQL注入攻击可以利用ML过程来缓解。在Waikato Climate for InformationInvestigation中完成了逻辑回归(LRN)、随机梯度下降(SDG)、顺序最小优化(SMO)、贝叶斯网络(BNK)、基于实例的学习器(IBK)、多层感知器(MLP)、朴素贝叶斯(NBS)和J48的探索性检验。利用等待(70%)和10-折痕交叉验证评估方法调查了调节学习分组计算的呈现,以确定最佳计算。交叉验证的结果显示,SMO、IBK和J48的准确率分别为98.7785%、98.4285%和98.2985%,而Hold-Out技术对SMO、IBK和J48的准确率分别为98.7956%、98.1526%和100。相比之下,IBK和j48使用交叉验证方法SMO分别需要10.15秒、0.06秒和14.12秒来创建模型,而使用Hold-Out技术SMO分别需要9.71秒、0.16秒和14.28秒来开发模型。根据结果,IBK被选为SQLIA检测和预防的分类器,因为它需要最少的时间来开发一个使用交叉验证方法的模型,并且在准确性、灵敏度和特异性方面比其他候选分类器表现更好。对于预测分析的最佳算法选择,除了准确性之外,各种性能评估指标也至关重要。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
SQL Injection Attack Detection Using Machine Learning Algorithm
One of the most widely recognised cyber-assaults against web-based application weaknesses is the structured query language injection attack (SQLIA), which is utilised to execute unlawful information control language, evade confirmation strategies, and access confined information. Some published systematic reviews were considered in this area. Older and more current papers in the field are often included in more recent systematic reviews. As a result, all of the publications we looked at were recent. I used data from 2012 to 2020 for the present analysis. There are a few techniques and systems for identifying and forestalling SQLIA, including encryption, XML, design coordinating, parsing, and machine learning. Guarded coding is utilised to apply Machine Learning (ML) procedure, which has been shown to be significant for SQLIA alleviation. The machine learning approach needs a ton of information to prepare models really and support a few attack types. An extremely difficult visually impaired SQL injection attack might be relieved utilizing ML procedures. An exploratory examination of Logistic Regression (LRN), Stochastic Gradient Descent (SDG), Sequential Minimal Optimization (SMO), Bayes Network (BNK), Instance-Based Learner (IBK), Multilayer Perceptron (MLP), Naive Bayes (NBS), and J48 was completed in the Waikato Climate for Information Investigation. The presentation of the regulated learning grouping calculations was surveyed utilizing Wait (70%) and 10-crease Cross Validation appraisal methods to decide the best calculation. According to the findings of the Cross Validation approach, SMO, IBK, and J48 had accuracy values of 98.7785%, 98.4285%, and 98.2985%, respectively, while the Hold-Out technique revealed accuracy values of 98.7956%, 98.1526%, and 100 for SMO, IBK, and J48. In contrast, IBK and J48 needed 10.15 seconds, 0.06 seconds, and 14.12 seconds, respectively, to create their models using the Cross Validation approach SMO, whereas they needed 9.71 seconds, 0.16 seconds, and 14.28 seconds, respectively, to develop their models using the Hold-Out technique SMO. According to the results, IBK was selected as the classifier for SQLIA detection and prevention since it required the least amount of time to develop a model using the Cross Validation approach and performed better than other candidates in terms of accuracy, sensitivity, and specificity. For the best algorithm selection for predictive analytics, various performance assessment measures are also crucial in addition to accuracy.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信