SQL injection attack: Detection, prioritization & prevention

被引:1
|
作者
Paul, Alan [1 ]
Sharma, Vishal [1 ]
Olukoya, Oluwafemi [1 ]
机构
[1] Queens Univ Belfast, Sch Elect Elect Engn & Comp Sci, Belfast, North Ireland
关键词
SQL injection; Web application security; HTTP requests; NetFlow; Network security; Machine learning; Threat intelligence; Vulnerability prioritization; Database attack; Deep learning; Risk modelling; CNN-LSTM MODEL;
D O I
10.1016/j.jisa.2024.103871
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Web applications have become central in the digital landscape, providing users instant access to information and allowing businesses to expand their reach. Injection attacks, such as SQL injection (SQLi), are prominent attacks on web applications, given that most web applications integrate a database system. While there have been solutions proposed in the literature for SQLi attack detection using learning-based frameworks, the problem is often formulated as a binary, single-attack vector problem without considering the prioritization and prevention component of the attack. In this work, we propose a holistic solution, SQLR34P3R, that formulates the SQLi attack as a multi-class, multi-attack vector, prioritization, and prevention problem. For attack detection and classification, we gathered 457,233 samples of benign and malicious network traffic, as well as 70,023 samples that had SQLi and benign payloads. After evaluating several machine-learning- based algorithms, the hybrid CNN-LSTM models achieve an average F1-Score of 97% in web and network traffic filtering. Furthermore, by using CVEs of SQLi vulnerabilities, SQLR34P3R incorporates a novel risk analysis approach which reduces additional effort while maintaining reasonable coverage to assist businesses in allocating resources effectively by focusing on patching vulnerabilities with high exploitability. We also present an in-the-wild evaluation of the proposed solution by integrating SQLR34P3R into the pipeline of known vulnerable web applications such as Damn Vulnerable Web Application (DVWA) and Vulnado and via network traffic captured using Wireshark from SQLi DNS exfiltration conducted with SQLMap for real-time detection. Finally, we provide a comparative analysis with state-of-the-art SQLi attack detection and risk ratings solutions.
引用
收藏
页数:21
相关论文
共 50 条
  • [21] SQL Injection Detection and Prevention Tools Assessment
    Tajpour, Atefeh
    Masrom, Maslin
    Heydari, Mohammad Zama
    Ibrahim, Suhaimi
    PROCEEDINGS OF THE 2014 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2014, : 730 - 731
  • [22] A Survey on SQL Injection Attacks, Detection and Prevention
    Hu, Jianwei
    Zhao, Wei
    Cui, Yanpeng
    ICMLC 2020: 2020 12TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND COMPUTING, 2018, : 483 - 488
  • [23] TPSQLi: Test Prioritization for SQL Injection Vulnerability Detection in Web Applications
    Yang, Guan-Yan
    Wang, Farn
    Gu, You-Zong
    Teng, Ya-Wen
    Yeh, Kuo-Hui
    Ho, Ping-Hsueh
    Wen, Wei-Ling
    APPLIED SCIENCES-BASEL, 2024, 14 (18):
  • [24] A BiLSTM Approach to Enhance the Accuracy of SQL Injection Attack Detection
    Li, Junyi
    2024 5TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND APPLICATION, ICCEA 2024, 2024, : 94 - 100
  • [25] Ensemble Machine Learning Approaches for Detection of SQL Injection Attack
    Farooq, Umar
    TEHNICKI GLASNIK-TECHNICAL JOURNAL, 2021, 15 (01): : 112 - 120
  • [26] SQL Injection Attack Detection Method using Expectation Criterion
    Xiao, Linghuan
    Matsumoto, Shinichi
    Ishikawa, Tomohisa
    Sakurai, Kouichi
    2016 FOURTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR), 2016, : 649 - 654
  • [27] SQL Injection Attack Detection Framework Based on HTTP Traffic
    Zhu, Zhongdong
    Jia, Shilin
    Li, Jishuai
    Qin, Sujuan
    Guo, Hui
    PROCEEDINGS OF ACM TURING AWARD CELEBRATION CONFERENCE, ACM TURC 2021, 2021, : 179 - 185
  • [28] Detection Method of SQL injection Attack in Cloud Computing Environment
    Wang, Kuisheng
    Hou, Yan
    PROCEEDINGS OF 2016 IEEE ADVANCED INFORMATION MANAGEMENT, COMMUNICATES, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IMCEC 2016), 2016, : 487 - 493
  • [29] Modeling a SQL Injection Attack
    Kaur, Navdeep
    Kaur, Parminder
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 77 - 82
  • [30] A Hybrid Method for Detection and Prevention of SQL Injection Attacks
    Ghafarian, Ahmad
    2017 COMPUTING CONFERENCE, 2017, : 833 - 838