Simulating SQL injection vulnerability exploitation using Q-learning reinforcement learning agents

被引:29
作者
Erdodi, Laszlo [1 ]
Sommervoll, Avald Aslaugson [1 ]
Zennaro, Fabio Massimo [1 ]
机构
[1] Univ Oslo, Dept Informat, Oslo, Norway
关键词
SQL injection; Capture the flag; Vulnerability detection; Autonomous agents; Reinforcement learning; Q-learning; LEVEL;
D O I
10.1016/j.jisa.2021.102903
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a formalization of the process of exploitation of SQL injection vulnerabilities. We consider a simplification of the dynamics of SQL injection attacks by casting this problem as a security capturethe-flag challenge. We model it as a Markov decision process, and we implement it as a reinforcement learning problem. We then deploy reinforcement learning agents tasked with learning an effective policy to perform SQL injection; we design our training in such a way that the agent learns not just a specific strategy to solve an individual challenge but a more generic policy that may be applied to perform SQL injection attacks against any system instantiated randomly by our problem generator. We analyze the results in terms of the quality of the learned policy and in terms of convergence time as a function of the complexity of the challenge and the learning agent's complexity. Our work fits in the wider research on the development of intelligent agents for autonomous penetration testing and white-hat hacking, and our results aim to contribute to understanding the potential and the limits of reinforcement learning in a security environment.
引用
收藏
页数:10
相关论文
共 30 条
[1]  
Benaddi Hafsa, 2020, Wireless Internet. 12th EAI International Conference, WiCON 2019. Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST 317), P73, DOI 10.1007/978-3-030-52988-8_7
[2]   Machine Learning Cyberattack and Defense Strategies [J].
Bland, John A. ;
Petty, Mikel D. ;
Whitaker, Tymaine S. ;
Maxwell, Katia P. ;
Cantrell, Walter Alan .
COMPUTERS & SECURITY, 2020, 92
[3]  
Erdodi L, 2020, ARXIV PREPRINT ARXIV
[4]  
Fraze D., 2016, Cyber grand challenge (CGC)
[5]   Reinforcement Learning for Efficient Network Penetration Testing [J].
Ghanem, Mohamed C. ;
Chen, Thomas M. .
INFORMATION, 2020, 11 (01)
[6]   Detection of SQL Injection Attacks: A Machine Learning Approach [J].
Hasan, Musaab ;
Balbahaith, Zayed ;
Tarique, Mohammed .
2019 INTERNATIONAL CONFERENCE ON ELECTRICAL AND COMPUTING TECHNOLOGIES AND APPLICATIONS (ICECTA), 2019,
[7]   A Deep Reinforcement Learning Approach for Anomaly Network Intrusion Detection System [J].
Hsu, Ying-Feng ;
Matsuoka, Morito .
2020 IEEE 9TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING (CLOUDNET), 2020,
[8]  
Joshi A, 2014, 2014 INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICCICCT), P1111, DOI 10.1109/ICCICCT.2014.6993127
[9]   ImageNet Classification with Deep Convolutional Neural Networks [J].
Krizhevsky, Alex ;
Sutskever, Ilya ;
Hinton, Geoffrey E. .
COMMUNICATIONS OF THE ACM, 2017, 60 (06) :84-90
[10]   Application of deep reinforcement learning to intrusion detection for supervised problems [J].
Lopez-Martin, Manuel ;
Carro, Belen ;
Sanchez-Esguevillas, Antonio .
EXPERT SYSTEMS WITH APPLICATIONS, 2020, 141