Duc-Chinh Nguyen , Manh-Hung Ha , Manh-Tuan Do , Oscal Tzyh-Chiang Chen
{"title":"采用非局部图卷积神经网络实现SQL注入检测的轻量化模型","authors":"Duc-Chinh Nguyen , Manh-Hung Ha , Manh-Tuan Do , Oscal Tzyh-Chiang Chen","doi":"10.1016/j.eij.2025.100684","DOIUrl":null,"url":null,"abstract":"<div><div>SQL injection poses serious threats to web applications and databases by enabling unauthorized access and data leakage. To address this issue, we propose a unique graph network, an innovative topology not explored previously for SQL injection detection. SQL statements are nodes, and their connections form edges in the graph. We introduce three graph CNN models, including a graph classification model with a two-layer Graph Convolutional Network (GCN), a graph classification model leveraging a non-local graph convolution derived from a 1x1 convolution, supplanting the original 1x1 convolution, and a modified non-local-block module by substituting the 1x1 convolution layers in the non-local architecture with GCN. The proposed models exhibit accuracy above 99% and inference times under 1 ms on two datasets. In comparison with traditional 22 models, our models using GCN demonstrate superior computation efficiency, parameter reduction, accuracy enhancement, and the advantage of handling input sequences of any length, underlining their potential in real-world cybersecurity systems, especially in effective SQL injection detection and mitigation strategies.</div></div>","PeriodicalId":56010,"journal":{"name":"Egyptian Informatics Journal","volume":"30 ","pages":"Article 100684"},"PeriodicalIF":4.3000,"publicationDate":"2025-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Towards lightweight model using non-local-based graph convolution neural network for SQL injection detection\",\"authors\":\"Duc-Chinh Nguyen , Manh-Hung Ha , Manh-Tuan Do , Oscal Tzyh-Chiang Chen\",\"doi\":\"10.1016/j.eij.2025.100684\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>SQL injection poses serious threats to web applications and databases by enabling unauthorized access and data leakage. To address this issue, we propose a unique graph network, an innovative topology not explored previously for SQL injection detection. SQL statements are nodes, and their connections form edges in the graph. We introduce three graph CNN models, including a graph classification model with a two-layer Graph Convolutional Network (GCN), a graph classification model leveraging a non-local graph convolution derived from a 1x1 convolution, supplanting the original 1x1 convolution, and a modified non-local-block module by substituting the 1x1 convolution layers in the non-local architecture with GCN. The proposed models exhibit accuracy above 99% and inference times under 1 ms on two datasets. In comparison with traditional 22 models, our models using GCN demonstrate superior computation efficiency, parameter reduction, accuracy enhancement, and the advantage of handling input sequences of any length, underlining their potential in real-world cybersecurity systems, especially in effective SQL injection detection and mitigation strategies.</div></div>\",\"PeriodicalId\":56010,\"journal\":{\"name\":\"Egyptian Informatics Journal\",\"volume\":\"30 \",\"pages\":\"Article 100684\"},\"PeriodicalIF\":4.3000,\"publicationDate\":\"2025-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Egyptian Informatics Journal\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1110866525000775\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Egyptian Informatics Journal","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1110866525000775","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
Towards lightweight model using non-local-based graph convolution neural network for SQL injection detection
SQL injection poses serious threats to web applications and databases by enabling unauthorized access and data leakage. To address this issue, we propose a unique graph network, an innovative topology not explored previously for SQL injection detection. SQL statements are nodes, and their connections form edges in the graph. We introduce three graph CNN models, including a graph classification model with a two-layer Graph Convolutional Network (GCN), a graph classification model leveraging a non-local graph convolution derived from a 1x1 convolution, supplanting the original 1x1 convolution, and a modified non-local-block module by substituting the 1x1 convolution layers in the non-local architecture with GCN. The proposed models exhibit accuracy above 99% and inference times under 1 ms on two datasets. In comparison with traditional 22 models, our models using GCN demonstrate superior computation efficiency, parameter reduction, accuracy enhancement, and the advantage of handling input sequences of any length, underlining their potential in real-world cybersecurity systems, especially in effective SQL injection detection and mitigation strategies.
期刊介绍:
The Egyptian Informatics Journal is published by the Faculty of Computers and Artificial Intelligence, Cairo University. This Journal provides a forum for the state-of-the-art research and development in the fields of computing, including computer sciences, information technologies, information systems, operations research and decision support. Innovative and not-previously-published work in subjects covered by the Journal is encouraged to be submitted, whether from academic, research or commercial sources.