Detecting SQL injection attacks by binary gray wolf optimizer and machine learning algorithms

被引:10
作者
Arasteh, Bahman [1 ,6 ]
Aghaei, Babak [2 ]
Farzad, Behnoud [3 ]
Arasteh, Keyvan [1 ]
Kiani, Farzad [4 ]
Torkamanian-Afshar, Mahsa [5 ]
机构
[1] Istinye Univ, Fac Engn & Nat Sci, Dept Software Engn, Istanbul, Turkiye
[2] Islamic Azad Univ, Malekan Branch, Dept Comp Engn, Malekan, Iran
[3] Seraj Inst, Dept Comp Engn, Tabriz, Azarbaijan, Iran
[4] Fatih Sultan Mehmet Vakif Univ, Data Sci Res & Applicat Ctr VEBIM, Istanbul, Turkiye
[5] Istanbul Topkapi Univ, Fac Engn, Comp Engn Dept, TR-34087 Istanbul, Turkiye
[6] Appl Sci Private Univ, Appl Sci Res Ctr, Amman, Jordan
关键词
Software security; SQL injection attacks; Artificial neural network; Feature selection; Binary gray wolf optimization algorithm; Accuracy;
D O I
10.1007/s00521-024-09429-z
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
SQL injection is one of the important security issues in web applications because it allows an attacker to interact with the application's database. SQL injection attacks can be detected using machine learning algorithms. The effective features should be employed in the training stage to develop an optimal classifier with optimal accuracy. Identifying the most effective features is an NP-complete combinatorial optimization problem. Feature selection is the process of selecting the training dataset's smallest and most effective features. The main objective of this study is to enhance the accuracy, precision, and sensitivity of the SQLi detection method. In this study, an effective method to detect SQL injection attacks has been proposed. In the first stage, a specific training dataset consisting of 13 features was prepared. In the second stage, two different binary versions of the Gray-Wolf algorithm were developed to select the most effective features of the dataset. The created optimal datasets were used by different machine learning algorithms. Creating a new SQLi training dataset with 13 numeric features, developing two different binary versions of the gray wolf optimizer to optimally select the features of the dataset, and creating an effective and efficient classifier to detect SQLi attacks are the main contributions of this study. The results of the conducted tests indicate that the proposed SQL injection detector obtain 99.68% accuracy, 99.40% precision, and 98.72% sensitivity. The proposed method increases the efficiency of attack detection methods by selecting 20% of the most effective features.
引用
收藏
页码:6771 / 6792
页数:22
相关论文
共 29 条
  • [1] SQL-injection vulnerability scanning tool for automatic creation of SQL-injection attacks
    Ali, Abdul Bashah Mat
    Shakhatreh, Ala' Yaseen Ibrahim
    Abdullah, Mohd Syazwan
    Alostad, Jasem
    [J]. WORLD CONFERENCE ON INFORMATION TECHNOLOGY (WCIT-2010), 2011, 3
  • [2] Clustered design-model generation from a program source code using chaos-based metaheuristic algorithms
    Arasteh, Bahman
    [J]. NEURAL COMPUTING & APPLICATIONS, 2023, 35 (04) : 3283 - 3305
  • [3] Program source code comprehension by module clustering using combination of discretized gray wolf and genetic algorithms
    Arasteh, Bahman
    Abdi, Mohammad
    Bouyer, Asgarali
    [J]. ADVANCES IN ENGINEERING SOFTWARE, 2022, 173
  • [4] Highly Available and Dependable E-learning Services Using Grid System
    Arasteh, Bahman
    Pirahesh, Sajjad
    Zakeri, Abdolnasser
    Arasteh, Behnam
    [J]. 3RD CYPRUS INTERNATIONAL CONFERENCE ON EDUCATIONAL RESEARCH (CY-ICER 2014), 2014, 143 : 471 - 476
  • [5] Developing Inherently Resilient Software Against Soft-Errors Based on Algorithm Level Inherent Features
    Arasteh, Bahman
    Miremadi, Seyed Ghassem
    Rahmani, Amir Masoud
    [J]. JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2014, 30 (02): : 193 - 212
  • [6] Bouyer A, 2007, IADIS INT C APPL COM
  • [7] Buehrer G., 2005, Proc. of 5th international workshop on Software engineering and middleware (SEM'05), (New York, NY, P106
  • [8] Buja Geogiana, 2014, 2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE), P60, DOI 10.1109/ISCAIE.2014.7010210
  • [9] JDBC checker: A static analysis tool for SQL/JDBC applications
    Gould, C
    Su, ZD
    Devanbu, P
    [J]. ICSE 2004: 26TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, PROCEEDINGS, 2004, : 697 - 698
  • [10] Research on the Technology of Detecting the SQL Injection Attack and Non-Intrusive Prevention in WEB System
    Hu, Haibin
    [J]. MATERIALS SCIENCE, ENERGY TECHNOLOGY, AND POWER ENGINEERING I, 2017, 1839