SDSIOT: An SQL Injection Attack Detection and Stage Identification Method Based on Outbound Traffic

被引:2
作者
Fu, Houlong [1 ]
Guo, Chun [1 ]
Jiang, Chaohui [1 ]
Ping, Yuan [2 ]
Lv, Xiaodan [1 ]
机构
[1] Guizhou Univ, Coll Comp Sci & Technol, State Key Lab Publ Big Data, Guiyang 550025, Peoples R China
[2] Xuchang Univ, Sch Informat Engn, Xuchang 461000, Peoples R China
关键词
SQL Injection Attack; Web security; attack detection; outbound traffic; stage identification;
D O I
10.3390/electronics12112472
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An SQL Injection Attack (SQLIA) is a major cyber security threat to Web services, and its different stages can cause different levels of damage to an information system. Attackers can construct complex and diverse SQLIA statements, which often cause most existing inbound-based detection methods to have a high false-negative rate when facing deformed or unknown SQLIA statements. Although some existing works have analyzed different features for the stages of SQLIA from the perspectives of attackers, they primarily focus on stage analysis rather than different stages' identification. To detect SQLIA and identify its stages, we analyze the outbound traffic from the Web server and find that it can differentiate between SQLIA traffic and normal traffic, and the outbound traffic generated during the two stages of SQLIA exhibits distinct characteristics. By employing 13 features extracted from outbound traffic, we propose an SQLIA detection and stage identification method based on outbound traffic (SDSIOT), which is a two-phase method that detects SQLIAs in Phase I and identifies their stages in Phase II. Importantly, it does not need to analyze the complex and diverse malicious statements made by attackers. The experimental results show that SDSIOT achieves an accuracy of 98.57% for SQLIA detection and 94.01% for SQLIA stage identification. Notably, the accuracy of SDSIOT's SQLIA detection is 8.22 percentage points higher than that of ModSecurity.
引用
收藏
页数:22
相关论文
共 41 条
[1]   Detection of SQL Injection Attack Using Machine Learning Techniques: A Systematic Literature Review [J].
Alghawazi, Maha ;
Alghazzawi, Daniyal ;
Alarifi, Suaad .
JOURNAL OF CYBERSECURITY AND PRIVACY, 2022, 2 (04) :764-777
[2]   RAT: Reinforcement-Learning-Driven and Adaptive Testing for Vulnerability Discovery in Web Application Firewalls [J].
Amouei, Mohammadhossein ;
Rezvani, Mohsen ;
Fateh, Mansoor .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (05) :3371-3386
[3]  
Anagandula Karthik, 2020, 2020 3rd International Conference on Data Intelligence and Security (ICDIS), P40, DOI 10.1109/ICDIS50059.2020.00012
[4]  
[Anonymous], 2021, SUPERSQLINJECTIONV1
[5]  
[Anonymous], MODSECURITY OPEN SOU
[6]  
[Anonymous], sqlmap: automatic SQL injection and database takeover tool
[7]  
[Anonymous], 2020, jSQL Injection
[8]  
Ao Luo, 2019, 2019 IEEE/ACIS 18th International Conference on Computer and Information Science (ICIS). Proceedings, P320
[9]  
Arora S., 2018, PROC C LEARN THEORY, P1455
[10]  
Chen D., 2021, P J PHYS C SERIES, V1757