SQL injection attack: Detection, prioritization & prevention

被引:1
作者
Paul, Alan [1 ]
Sharma, Vishal [1 ]
Olukoya, Oluwafemi [1 ]
机构
[1] Queens Univ Belfast, Sch Elect Elect Engn & Comp Sci, Belfast, North Ireland
关键词
SQL injection; Web application security; HTTP requests; NetFlow; Network security; Machine learning; Threat intelligence; Vulnerability prioritization; Database attack; Deep learning; Risk modelling; CNN-LSTM MODEL;
D O I
10.1016/j.jisa.2024.103871
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Web applications have become central in the digital landscape, providing users instant access to information and allowing businesses to expand their reach. Injection attacks, such as SQL injection (SQLi), are prominent attacks on web applications, given that most web applications integrate a database system. While there have been solutions proposed in the literature for SQLi attack detection using learning-based frameworks, the problem is often formulated as a binary, single-attack vector problem without considering the prioritization and prevention component of the attack. In this work, we propose a holistic solution, SQLR34P3R, that formulates the SQLi attack as a multi-class, multi-attack vector, prioritization, and prevention problem. For attack detection and classification, we gathered 457,233 samples of benign and malicious network traffic, as well as 70,023 samples that had SQLi and benign payloads. After evaluating several machine-learning- based algorithms, the hybrid CNN-LSTM models achieve an average F1-Score of 97% in web and network traffic filtering. Furthermore, by using CVEs of SQLi vulnerabilities, SQLR34P3R incorporates a novel risk analysis approach which reduces additional effort while maintaining reasonable coverage to assist businesses in allocating resources effectively by focusing on patching vulnerabilities with high exploitability. We also present an in-the-wild evaluation of the proposed solution by integrating SQLR34P3R into the pipeline of known vulnerable web applications such as Damn Vulnerable Web Application (DVWA) and Vulnado and via network traffic captured using Wireshark from SQLi DNS exfiltration conducted with SQLMap for real-time detection. Finally, we provide a comparative analysis with state-of-the-art SQLi attack detection and risk ratings solutions.
引用
收藏
页数:21
相关论文
共 50 条
  • [41] SIDNet: A SQL Injection Detection Network for Enhancing Cybersecurity
    Muduli, Debendra
    Shookdeb, Shantanu
    Zamani, Abu Taha
    Saxena, Surabhi
    Kanade, Anuradha Shantanu
    Parveen, Nikhat
    Shameem, Mohammad
    [J]. IEEE ACCESS, 2024, 12 : 176511 - 176526
  • [42] SQL Injection Detection for Web Applications Based on Elastic-Pooling CNN
    Xie, Xin
    Ren, Chunhui
    Fu, Yusheng
    Xu, Jie
    Guo, Jinhong
    [J]. IEEE ACCESS, 2019, 7 : 151475 - 151481
  • [43] SQL Injection Detection and Prevention System with Raspberry Pi Honeypot Cluster for Trapping Attacker
    Djanali, Supeno
    Arunanto, F. X.
    Pratomo, Baskoro Adi
    Studiawan, Hudan
    Nugraha, Satrio Gita
    [J]. 2014 1ST INTERNATIONAL SYMPOSIUM ON TECHNOLOGY MANAGEMENT AND EMERGING TECHNOLOGIES (ISTMET 2014), 2014, : 163 - 166
  • [44] Machine Learning for SQL Injection Prevention on Server-Side Scripting
    Kamtuo, Krit
    Soomlek, Chitsutha
    [J]. 2016 20TH INTERNATIONAL COMPUTER SCIENCE AND ENGINEERING CONFERENCE (ICSEC), 2016,
  • [45] Defeating SQL injection attack in authentication security: an experimental study
    Das, Debasish
    Sharma, Utpal
    Bhattacharyya, D. K.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2019, 18 (01) : 1 - 22
  • [46] A Top Web Security Vulnerability SQL Injection attack - Survey
    Abirami, J.
    Devakunchari, R.
    Valliyammai, C.
    [J]. 2015 SEVENTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2015,
  • [47] SQL Injection Attack Principles and Preventive Techniques for PHP Site
    Zhang, Haiyan
    Zhang, Xiao
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND APPLICATION ENGINEERING (CSAE2018), 2018,
  • [48] Bulwark Against SQL Injection Attack-An Unified Approach
    Madan, Sushila
    Madan, Supriya
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (05): : 305 - 313
  • [49] Defeating SQL injection attack in authentication security: an experimental study
    Debasish Das
    Utpal Sharma
    D. K. Bhattacharyya
    [J]. International Journal of Information Security, 2019, 18 : 1 - 22
  • [50] How to Prevent SQL Injection Attack Based on Web Applications
    Zheng Haiyan
    Wu Weituan
    Zhang Ruili
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY AND MANAGEMENT SCIENCE (ITMS 2015), 2015, 34 : 854 - 857