A SQL Injection Detection Method Based on Adaptive Deep Forest

被引:37
作者
Li, Qi [1 ]
Li, Weishi [1 ]
Wang, Junfeng [2 ]
Cheng, Mingyu [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Beijing Key Lab Interconnect & Integrat, Beijing 100876, Peoples R China
[2] Sichuan Univ, Sch Aeronaut & Astronaut, Chengdu 610065, Sichuan, Peoples R China
基金
中国国家自然科学基金;
关键词
SQL injection detection; adaptive deep forest; Web security; AdaBoost;
D O I
10.1109/ACCESS.2019.2944951
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Injection attack is the first of the top 10 security threats announced by the OWASP. Meanwhile, SQL injection is one of the most important types among the injection attacks. Because of its various types and fast variations, SQL injection can cause great harm to the network, resulting in data leakage and website paralysis. Due to the heterogeneity of attack load, the diversity of attack methods and the variety of attack modes, SQL injection detection is still a challenging problem. How to defense SQL injection attack effectively becomes the focus and frontier of web security nowadays. Therefore, this paper proposes an adaptive deep forest-based method to detect the complex SQL injection attacks. Firstly, the structure of deep forest is optimized in our paper, the input of each layer is concatenated by the raw feature vector and average of previous outputs. Experiments show that our proposed method effectively solves the problem that the original features of deep forests are degraded with the increasing number of layers. Then, we introduce an AdaBoost algorithm based deep forest model which utilizes error rate to update the weights of features on each layer. That is, in the process of training, different features are assigned with different weights based on their influence on the result. Our model can automatically adjust the structure of the tree model and deal with multi-dimensional fine-grained features to avoid over-fitting problem effectively. The experimental results show that the proposed method has a better performance than classical machine learning methods and deep learning methods.
引用
收藏
页码:145385 / 145394
页数:10
相关论文
共 25 条
  • [1] [Anonymous], P INT C APPL HUM FAC
  • [2] [Anonymous], 2018, IEEE T INF FOREN SEC, DOI DOI 10.1109/TIFS.2018.2812196
  • [3] [Anonymous], P INT C SEC INT COMP
  • [4] [Anonymous], OWASP TOP 10 2017
  • [5] [Anonymous], P DYN SQL
  • [6] [Anonymous], P INT C ADV INT SYST
  • [7] [Anonymous], IEEE T DEPEND SEC CO
  • [8] [Anonymous], INT J INF SECUR
  • [9] Appiah B, 2017, INT CONF SOFTW ENG, P583, DOI 10.1109/ICSESS.2017.8342983
  • [10] Choi JH, 2011, IEEE INT C BIO BIO W, P1061, DOI 10.1109/BIBMW.2011.6112561