SSQLi: A Black-Box Adversarial Attack Method for SQL Injection Based on Reinforcement Learning

被引:4
作者
Guan, Yuting [1 ]
He, Junjiang [1 ]
Li, Tao [1 ]
Zhao, Hui [1 ]
Ma, Baoqiang [1 ]
机构
[1] Sichuan Univ, Sch Cyber Sci & Engn, Chengdu 610065, Peoples R China
来源
FUTURE INTERNET | 2023年 / 15卷 / 04期
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
SQL injection; adversarial attack; black-box attack; reinforcement learning; attack-rule matrix; adversarial example;
D O I
10.3390/fi15040133
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
SQL injection is a highly detrimental web attack technique that can result in significant data leakage and compromise system integrity. To counteract the harm caused by such attacks, researchers have devoted much attention to the examination of SQL injection detection techniques, which have progressed from traditional signature-based detection methods to machine- and deep-learning-based detection models. These detection techniques have demonstrated promising results on existing datasets; however, most studies have overlooked the impact of adversarial attacks, particularly black-box adversarial attacks, on detection methods. This study addressed the shortcomings of current SQL injection detection techniques and proposed a reinforcement-learning-based black-box adversarial attack method. The proposal included an innovative vector transformation approach for the original SQL injection payload, a comprehensive attack-rule matrix, and a reinforcement-learning-based method for the adaptive generation of adversarial examples. Our approach was evaluated on existing web application firewalls (WAF) and detection models based on machine- and deep-learning methods, and the generated adversarial examples successfully bypassed the detection method at a rate of up to 97.39%. Furthermore, there was a substantial decrease in the detection accuracy of the model after multiple attacks had been carried out on the detection model via the adversarial examples.
引用
收藏
页数:18
相关论文
共 34 条
[1]   RAT: Reinforcement-Learning-Driven and Adaptive Testing for Vulnerability Discovery in Web Application Firewalls [J].
Amouei, Mohammadhossein ;
Rezvani, Mohsen ;
Fateh, Mansoor .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (05) :3371-3386
[2]  
Ao Luo, 2019, 2019 IEEE/ACIS 18th International Conference on Computer and Information Science (ICIS). Proceedings, P320
[3]   XSS adversarial example attacks based on deep reinforcement learning [J].
Chen, Li ;
Tang, Cong ;
He, Junjiang ;
Zhao, Hui ;
Lan, Xiaolong ;
Li, Tao .
COMPUTERS & SECURITY, 2022, 120
[4]  
Christodoulou P, 2019, Arxiv, DOI arXiv:1910.07207
[5]  
Clay Keller, VULNERABILITY DSTRIB
[6]   WAF-A-MoLE: Evading Web Application Firewalls through Adversarial Machine Learning [J].
Demetrio, Luca ;
Valenza, Andrea ;
Costa, Gabriele ;
Lagorio, Giovanni .
PROCEEDINGS OF THE 35TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING (SAC'20), 2020, :1745-1752
[7]  
Fang Y., 2018, P 2 INT C GUIYANG CH
[8]   RLXSS: Optimizing XSS Detection Model to Defend Against Adversarial Attacks Based on Reinforcement Learning [J].
Fang, Yong ;
Huang, Cheng ;
Xu, Yijia ;
Li, Yang .
FUTURE INTERNET, 2019, 11 (08)
[9]  
github, MART SPIDERLABS MODS
[10]  
Goswami G., 2018, P AAAI C ART INT NEW, VVolume 32