Simulating all archetypes of SQL injection vulnerability exploitation using reinforcement learning agents

被引:0
作者
Sommervoll, Avald Aslaugson [1 ]
Erdodi, Laszlo [2 ]
Zennaro, Fabio Massimo [3 ]
机构
[1] Univ Oslo, Dept Informat, Gaustadalleen 23B, N-0373 Oslo, Norway
[2] Norwegian Univ Sci & Technol, Dept Informat Secur & Commun Technol, Hogskoleringen 1, N-7034 Trondheim, Trondelag, Norway
[3] Univ Warwick, Dept Comp Sci, 6 Lord Bhattacharyya Way, Coventry CV4 7EZ, West Midlands, England
关键词
SQL injection; Capture the flag; Vulnerability detection; Autonomous agents; Reinforcement learning; Q-learning;
D O I
10.1007/s10207-023-00738-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Vulnerabilities such as SQL injection represent a serious challenge to security. While tools with a pre-defined logic are commonly used in the field of penetration testing, the continually evolving nature of the security challenge calls for models able to learn autonomously from experience. In this paper we build on previous results on the development of reinforcement learning models devised to exploit specific forms of SQL injection, and we design agents that are able to tackle a varied range of SQL injection vulnerabilities, virtually comprising all the archetypes normally considered by experts. We show that our agents, trained on a synthetic environment, perform a transfer of learning among the different SQL injections challenges; in particular, they learn to use their queries to efficiently gain knowledge about multiple vulnerabilities at once. We also introduce a novel and more versatile way to interpret server messages that reduces reliance on expert inputs. Our simulations show the feasibility of our approach which easily deals with a number of homogeneous challenges, as well as some of its limitations when presented with problems having higher degrees of uncertainty.
引用
收藏
页码:225 / 246
页数:22
相关论文
共 21 条
  • [1] Acunetix, 2020, AC VULN SCANN
  • [2] Machine Learning Cyberattack and Defense Strategies
    Bland, John A.
    Petty, Mikel D.
    Whitaker, Tymaine S.
    Maxwell, Katia P.
    Cantrell, Walter Alan
    [J]. COMPUTERS & SECURITY, 2020, 92
  • [3] Blankenship H., 2020, OWASP TOP 10
  • [4] cvedetails, CVEDETAILS VULN DIST
  • [5] Damele B., 2011, SQLMAP USERS MANUAL
  • [6] Del Verme M., LECT NOTES COMPUTER, V13115
  • [7] Dhir N., 2021, ARXIV
  • [8] Simulating SQL injection vulnerability exploitation using Q-learning reinforcement learning agents
    Erdodi, Laszlo
    Sommervoll, Avald Aslaugson
    Zennaro, Fabio Massimo
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 61
  • [9] On the Security of Machine Learning in Malware C&C Detection: A Survey
    Gardiner, Joseph
    Nagaraja, Shishir
    [J]. ACM COMPUTING SURVEYS, 2016, 49 (03)
  • [10] Reinforcement Learning for Efficient Network Penetration Testing
    Ghanem, Mohamed C.
    Chen, Thomas M.
    [J]. INFORMATION, 2020, 11 (01)