A deep learning approach based on multi-view consensus for SQL injection detection

被引:1
作者
Kakisim, Arzu Gorgulu [1 ]
机构
[1] Istanbul Medeniyet Univ, Comp Engn, Istanbul, Turkiye
关键词
SQL injection; Deep learning; Code injection; Information security; XAI;
D O I
10.1007/s10207-023-00791-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
SQL injection (SQLi) attacks are one of the oldest and most serious security threats, consistently ranking among the top ten critical web security risks. Traditional defense mechanisms against SQL injection predominantly use blacklists to disallow common injection characters or terms. However, the major challenge for these systems is to create a comprehensive list of potential SQLi characters, terms, and multi-terms that encompass various types of SQLi attacks (time-based, error-based, etc.), taking into account various SQL datasets (such as MySQL, Oracle, and NoSQL). Recently, some research studies have concentrated on feature learning from SQL queries by applying some well-known deep architectures to detect SQLi attacks. Motivated by a similar objective, this research introduces a novel deep learning-based SQLi detection system named "Bidirectional LSTM-CNN based on Multi-View Consensus" (MVC-BiCNN). The proposed method implements a pre-processing step that generates multiple views from SQL data by semantically encoding SQL statements into their corresponding SQL tags. By utilizing two different main layers, which are bidirectional long short-term memory (LSTM) and convolutional neural network (CNN), the proposed method learns a joint latent space from multi-view representations. In the detection phase, the proposed method yields separate predictions for each representation and assesses whether the query constitutes an SQLi attack based on a consensus function's output. Moreover, Interpretable Model-Agnostic Annotations (LIME), one of the methods of Explainable Artificial Intelligence (XAI), is employed for the purpose of interpreting the model's results and analyzing the SQL injection (SQLi) inputs. The experimental results demonstrate that MVC-BiCNN outperforms the baseline methods, yielding 99.96% detection rate.
引用
收藏
页码:1541 / 1556
页数:16
相关论文
共 30 条
  • [1] CODDLE: Code-Injection Detection With Deep Learning
    Abaimov, Stanislav
    Bianchi, Giuseppe
    [J]. IEEE ACCESS, 2019, 7 : 128617 - 128627
  • [2] Deep Learning for Vulnerability and Attack Detection on Web Applications: A Systematic Literature Review
    Alaoui, Rokia Lamrani
    Nfaoui, El Habib
    [J]. FUTURE INTERNET, 2022, 14 (04):
  • [3] An algorithm for detecting SQL injection vulnerability using black-box testing
    Aliero, Muhammad Saidu
    Ghani, Imran
    Qureshi, Kashif Naseer
    Rohani, Mohd Fo'ad
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (01) : 249 - 266
  • [4] [Anonymous], 2005, ASE 05 PROC 20 IEEEA
  • [5] Ao Luo, 2019, 2019 IEEE/ACIS 18th International Conference on Computer and Information Science (ICIS). Proceedings, P320
  • [6] Atoum J.O., 2014, International Journal of Database Management Systems, V6, P21, DOI DOI 10.5121/IJDMS.2014.6102
  • [7] Bin Qin, 2020, 2020 International Conference on Big Data, Artificial Intelligence and Internet of Things Engineering (ICBAIE), P162, DOI 10.1109/ICBAIE49996.2020.00041
  • [8] CANDID: Dynamic Candidate Evaluations for Automatic Prevention of SQL Injection Attacks
    Bisht, Prithvi
    Madhusudan, P.
    Venkatakrishnan, V. N.
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2010, 13 (02)
  • [9] Detecting malicious Java']JavaScript code based on semantic analysis
    Fang, Yong
    Huang, Cheng
    Su, Yu
    Qiu, Yaoyao
    [J]. COMPUTERS & SECURITY, 2020, 93
  • [10] WOVSQLI: Detection of SQL Injection Behaviors Using Word Vector and LSTM
    Fang, Yong
    Peng, Jiayi
    Liu, Liang
    Huang, Cheng
    [J]. ICCSP 2018: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY, 2018, : 170 - 174