Evaluation of Various Techniques for SQL Injection Attack Detection

被引:2
|
作者
Choras, Michal [1 ]
Kozik, Rafal [2 ]
机构
[1] ITTI Ltd, Poznan, Poland
[2] UT&LS Bydgoszcz, Inst Telecommun, Bydgoszcz, Poland
关键词
D O I
10.1007/978-3-319-00969-8_74
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The network technology has evolved significantly recently. The growing use of cloud services, increased number of users, novel mobile operating systems and changes in network infrastructures that connect devices make novel challenges for cyber security. In order to counter arising threats, network security mechanisms and protection schemes also evolve and use sophisticated sensors and methods. In our previous work [27] we have introduced an innovative evolutionary algorithm for modeling genuine SQL queries generated by web-application. In [28] we have investigated how the proposed algorithm can be combined together with other OffThe- Shelf solutions (like SNORT and SCALP tools) in order to increase the detection ratio of injection attacks. In this paper we have significantly extended our test suite. First of all, we have compared our method with new efficient solutions for injection attack detection. We have also deeply discussed the drawbacks and benefits of these solutions. We have also explained how the correlation techniques can be adapted in order to overcome these drawbacks without loosing high effectiveness.
引用
收藏
页码:753 / 762
页数:10
相关论文
共 50 条
  • [1] Artificial Intelligence Techniques for SQL Injection Attack Detection
    Irungu, John
    Graham, Steffi
    Girma, Anteneh
    Kacem, Thabet
    PROCEEDINGS OF 2023 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION TECHNOLOGY, ICIIT 2023, 2023, : 38 - 45
  • [2] Evaluation of SQL Injection Detection and Prevention Techniques
    Tajpour, Atefeh
    Shooshtari, Mohammad JorJor Zade
    2010 SECOND INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE, COMMUNICATION SYSTEMS AND NETWORKS (CICSYN), 2010, : 216 - 221
  • [3] Analysis and implementation of SQL injection attack and countermeasures using SQL injection prevention techniques
    Jesudoss, A.
    Mercy, Theresa M.
    Christy, A.
    Maheswari, M.
    Selvi, M.
    Ulagamuthalvi, V
    INTERNATIONAL JOURNAL OF ENGINEERING SYSTEMS MODELLING AND SIMULATION, 2022, 13 (04) : 262 - 267
  • [4] Detection Model for SQL Injection Attack: An Approach for Preventing a Web Application from the SQL Injection Attack
    Buja, Geogiana
    Bin Abd Jalil, Kamarularifin
    Ali, Fakariah Bt Hj Mohd
    Rahman, Teh Faradilla Abdul
    2014 IEEE SYMPOSIUM ON COMPUTER APPLICATIONS AND INDUSTRIAL ELECTRONICS (ISCAIE), 2014,
  • [5] SQL injection attack: Detection, prioritization & prevention
    Paul, Alan
    Sharma, Vishal
    Olukoya, Oluwafemi
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 85
  • [6] SQL Injection Attack Detection using ResNet
    Sangeeta
    Nagasundari, S.
    Honnavali, Prasad B.
    2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2019,
  • [7] On Defense and Detection of SQL SERVER Injection Attack
    Xue, Qian
    He, Peng
    2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [8] Enhanced Approach to Detection of SQL Injection Attack
    Karuparthi, Raja Prasad
    Zhou, Bing
    2016 15TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2016), 2016, : 466 - 469
  • [9] Client-Side Detection of SQL Injection Attack
    Shahriar, Hossain
    North, Sarah
    Chen, Wei-Chuen
    ADVANCED INFORMATION SYSTEMS ENGINEERING WORKSHOPS (CAISE), 2013, 148 : 512 - 517
  • [10] SQL injection attack detection in network flow data
    Crespo-Martinez, Ignacio Samuel
    Campazas-Vega, Adrian
    Guerrero-Higueras, Angel Manuel
    Riego-DelCastillo, Virginia
    Alvarez-Aparicio, Claudia
    Fernandez-Llamas, Camino
    COMPUTERS & SECURITY, 2023, 127