SQL Injection Detection Based on Deep Belief Network

被引:7
|
作者
Zhang, Huafeng [1 ]
Zhao, Bo [1 ]
Yuan, Hui [2 ]
Zhao, Jinxiong [1 ]
Yan, Xiaobin [1 ]
Li, Fangjun [1 ]
机构
[1] State Grid Gansu Elect Power Co, Lanzhou, Peoples R China
[2] State Grid Gansu Elect Power Res Inst, Lanzhou, Peoples R China
来源
PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND APPLICATION ENGINEERING (CSAE2019) | 2019年
关键词
Cyber Security; SQL Injection; Deep Learning; Deep Belief Network (DBN);
D O I
10.1145/3331453.3361280
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
At present, the ways for detecting SQL injection attacks include pre-compilation of SQL statements, filtering user input at the WEB layer to prevent SQL injection, such as filtering global parameters with Filter, strictly restricting the operation authority of the database, and trying to satisfy all. The lowest permissions for the operation, etc. The detection method for the SQL injection attack is mainly to analyze the incoming parameters to determine whether an illegal parameter is passed in. However, due to the poor real-time performance of the analyzed traffic content and the accuracy, the false positive rate is not ideal. Therefore, this paper proposes a deep learning-based approach to find SQL injection aggression. It does not need to analyze and extract all the content. It only needs to find out the features needed by the model. Entering these features into the model that is trained in advance can detect SQL injection attacks traffic in real time. This paper use deep learning to identify SQL injection attacks in network traffic. We select the target features according to the attack characteristics of the SQL injection attack and get request from url or post packet as train data; use the deep belief network (DBN) model to train the selected features and the collected sample data, and finally get an identifiable SQL Injection attack model. Finally find a best model for Detecting SQL injection, and achieve online and real-time detection.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] DroidVecDeep: Android Malware Detection Based on Word2Vec and Deep Belief Network
    Chen, Tieming
    Mao, Qingyu
    Lv, Mingqi
    Cheng, Hongbing
    Li, Yinglong
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (04): : 2180 - 2197
  • [42] Signal Modulation Classification Based on Deep Belief Network
    Li, Wenwen
    Dou, Zheng
    Wang, Can
    Zhang, Yu
    2019 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2019,
  • [43] Deep Belief Networks Based Voice Activity Detection
    Zhang, Xiao-Lei
    Wu, Ji
    IEEE TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING, 2013, 21 (04): : 697 - 710
  • [44] Intrusion detection model based on deep belief nets
    Gao, Ni
    Gao, Ling
    He, Yiyue
    Gao, Quanli
    Ren, Jie
    Journal of Southeast University (English Edition), 2015, 31 (03) : 339 - 346
  • [45] A Semantic Learning-Based SQL Injection Attack Detection Technology
    Lu, Dongzhe
    Fei, Jinlong
    Liu, Long
    ELECTRONICS, 2023, 12 (06)
  • [46] An Intrusion Detection System Based on Deep Belief Networks
    Belarbi, Othmane
    Khan, Aftab
    Carnelli, Pietro
    Spyridopoulos, Theodoros
    SCIENCE OF CYBER SECURITY, SCISEC 2022, 2022, 13580 : 377 - 392
  • [47] A Deep Learning Method for Pathological Voice Detection using Convolutional Deep Belief Network
    Wu, Huiyi
    Soraghan, John
    Lowit, Anja
    Di Caterina, Gaetano
    19TH ANNUAL CONFERENCE OF THE INTERNATIONAL SPEECH COMMUNICATION ASSOCIATION (INTERSPEECH 2018), VOLS 1-6: SPEECH RESEARCH FOR EMERGING MARKETS IN MULTILINGUAL SOCIETIES, 2018, : 446 - 450
  • [48] Optimized Deep Belief Network for Efficient Fault Detection in Induction Motor
    Katta, Pradeep
    Karunanithi, K.
    Raja, S. P.
    Ramesh, S.
    Prakash, S. Vinoth John
    Joseph, Deepthi
    ADCAIJ-ADVANCES IN DISTRIBUTED COMPUTING AND ARTIFICIAL INTELLIGENCE JOURNAL, 2024, 13
  • [49] Detection of SQL Injection Attacks by Removing the Parameter Values of SQL Query
    Katole, Rajashree A.
    Sherekar, Swati S.
    Thakare, Vilas M.
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2018), 2018, : 736 - 741
  • [50] Optimal Deep Belief Network Enabled Malware Detection and Classification Model
    Chandran, P. Pandi
    Rajini, N. Hema
    Jeyakarthic, M.
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 35 (03) : 3349 - 3364