SQL injection attack: Detection, prioritization & prevention

被引:1
|
作者
Paul, Alan [1 ]
Sharma, Vishal [1 ]
Olukoya, Oluwafemi [1 ]
机构
[1] Queens Univ Belfast, Sch Elect Elect Engn & Comp Sci, Belfast, North Ireland
关键词
SQL injection; Web application security; HTTP requests; NetFlow; Network security; Machine learning; Threat intelligence; Vulnerability prioritization; Database attack; Deep learning; Risk modelling; CNN-LSTM MODEL;
D O I
10.1016/j.jisa.2024.103871
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Web applications have become central in the digital landscape, providing users instant access to information and allowing businesses to expand their reach. Injection attacks, such as SQL injection (SQLi), are prominent attacks on web applications, given that most web applications integrate a database system. While there have been solutions proposed in the literature for SQLi attack detection using learning-based frameworks, the problem is often formulated as a binary, single-attack vector problem without considering the prioritization and prevention component of the attack. In this work, we propose a holistic solution, SQLR34P3R, that formulates the SQLi attack as a multi-class, multi-attack vector, prioritization, and prevention problem. For attack detection and classification, we gathered 457,233 samples of benign and malicious network traffic, as well as 70,023 samples that had SQLi and benign payloads. After evaluating several machine-learning- based algorithms, the hybrid CNN-LSTM models achieve an average F1-Score of 97% in web and network traffic filtering. Furthermore, by using CVEs of SQLi vulnerabilities, SQLR34P3R incorporates a novel risk analysis approach which reduces additional effort while maintaining reasonable coverage to assist businesses in allocating resources effectively by focusing on patching vulnerabilities with high exploitability. We also present an in-the-wild evaluation of the proposed solution by integrating SQLR34P3R into the pipeline of known vulnerable web applications such as Damn Vulnerable Web Application (DVWA) and Vulnado and via network traffic captured using Wireshark from SQLi DNS exfiltration conducted with SQLMap for real-time detection. Finally, we provide a comparative analysis with state-of-the-art SQLi attack detection and risk ratings solutions.
引用
收藏
页数:21
相关论文
共 50 条
  • [1] SQL injection attack detection in network flow data
    Crespo-Martinez, Ignacio Samuel
    Campazas-Vega, Adrian
    Guerrero-Higueras, Angel Manuel
    Riego-DelCastillo, Virginia
    Alvarez-Aparicio, Claudia
    Fernandez-Llamas, Camino
    COMPUTERS & SECURITY, 2023, 127
  • [2] Research of SQL Injection Attack and Prevention Technology
    Qian, Li
    Zhu, Zhenyuan
    Hu, Lun
    Liu, Shuying
    PROCEEDINGS OF 2015 INTERNATIONAL CONFERENCE ON ESTIMATION, DETECTION AND INFORMATION FUSION ICEDIF 2015, 2015, : 303 - 306
  • [3] Analysis and implementation of SQL injection attack and countermeasures using SQL injection prevention techniques
    Jesudoss, A.
    Mercy, Theresa M.
    Christy, A.
    Maheswari, M.
    Selvi, M.
    Ulagamuthalvi, V
    INTERNATIONAL JOURNAL OF ENGINEERING SYSTEMS MODELLING AND SIMULATION, 2022, 13 (04) : 262 - 267
  • [4] Detection Model for SQL Injection Attack: An Approach for Preventing a Web Application from the SQL Injection Attack
    Buja, Geogiana
    Bin Abd Jalil, Kamarularifin
    Ali, Fakariah Bt Hj Mohd
    Rahman, Teh Faradilla Abdul
    2014 IEEE SYMPOSIUM ON COMPUTER APPLICATIONS AND INDUSTRIAL ELECTRONICS (ISCAIE), 2014,
  • [5] SQL Injection: Types, Methodology, Attack Queries and Prevention
    Singh, Nanhay
    Dayal, Mohit
    Raw, R. S.
    Kumar, Suresh
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 2872 - 2876
  • [6] SQL Injection Attack Detection using ResNet
    Sangeeta
    Nagasundari, S.
    Honnavali, Prasad B.
    2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2019,
  • [7] Prevention of SQL Injection Attack Using Query Transformation and Hashing
    Kar, Debabrata
    Panigrahi, Suvasini
    PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2013, : 1317 - 1323
  • [8] Client-Side Detection of SQL Injection Attack
    Shahriar, Hossain
    North, Sarah
    Chen, Wei-Chuen
    ADVANCED INFORMATION SYSTEMS ENGINEERING WORKSHOPS (CAISE), 2013, 148 : 512 - 517
  • [9] Artificial Intelligence Techniques for SQL Injection Attack Detection
    Irungu, John
    Graham, Steffi
    Girma, Anteneh
    Kacem, Thabet
    PROCEEDINGS OF 2023 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION TECHNOLOGY, ICIIT 2023, 2023, : 38 - 45
  • [10] A Framework for the Detection and Prevention of SQL Injection Attacks
    Shafie, Emad
    Cau, Antonio
    PROCEEDINGS OF THE 11TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2012, : 329 - 336