Ensemble Machine Learning Approaches for Detection of SQL Injection Attack

被引:11
作者
Farooq, Umar [1 ]
机构
[1] Cent Univ Punjab, Dept Comp Sci & Technol Cyber Secur, City Campus,Mansa Rd, Bathinda 151001, Punjab, India
来源
TEHNICKI GLASNIK-TECHNICAL JOURNAL | 2021年 / 15卷 / 01期
关键词
Boosting; ensemble learning; Light GBM; SQL injection; web security;
D O I
10.31803/tg-20210205101347
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In the current era, SQL Injection Attack is a serious threat to the security of the ongoing cyber world particularly for many web applications that reside over the internet. Many webpages accept the sensitive information (e.g. username, passwords, bank details, etc.) from the users and store this information in the database that also resides over the internet. Despite the fact that this online database has much importance for remotely accessing the information by various business purposes but attackers can gain unrestricted access to these online databases or bypass authentication procedures with the help of SQL Injection Attack. This attack results in great damage and variation to database and has been ranked as the topmost security risk by OWASP TOP 10. Considering the trouble of distinguishing unknown attacks by the current principle coordinating technique, a strategy for SQL injection detection dependent on Machine Learning is proposed. Our motive is to detect this attack by splitting the queries into their corresponding tokens with the help of tokenization and then applying our algorithms over the tokenized dataset. We used four Ensemble Machine Learning algorithms: Gradient Boosting Machine (GBM), Adaptive Boosting (AdaBoost), Extended Gradient Boosting Machine (XGBM), and Light Gradient Boosting Machine (LGBM). The results yielded by our models are near to perfection with error rate being almost negligible. The best results are yielded by LGBM with an accuracy of 0.993371, and precision, recall, f1 as 0.993373, 0.993371, and 0.993370, respectively. The LGBM also yielded less error rate with False Positive Rate (FPR) and Root Mean Squared Error (RMSE) to be 0.120761 and 0.007, respectively. The worst results are yielded by AdaBoost with an accuracy of 0.991098, and precision, recall, f1 as 0.990733, 0.989175, and 0.989942, respectively. The AdaBoost also yielded high False Positive Rate (FPR) to be 0.009.
引用
收藏
页码:112 / 120
页数:9
相关论文
共 16 条
  • [1] [Anonymous], 2005, INPROCEEDINGS 20 IEE
  • [2] Basta C, 2016, INT J ADV COMPUT SC, V7, P129
  • [3] Runtime Monitors to Detect and Prevent Union Query based SQL Injection Attacks
    Dharam, Ramya
    Shiva, Sajjan. G.
    [J]. PROCEEDINGS OF THE 2013 10TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2013, : 357 - 362
  • [4] Farooq U., 2020, Int J Eng Res Technol (IJERT), V9, P359
  • [5] Jagadessan J., 2019, INT J ENG ADV TECHNO, V8, P791
  • [6] Joshi A, 2014, 2014 INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICCICCT), P1111, DOI 10.1109/ICCICCT.2014.6993127
  • [7] Kar D, 2016, PROCEEDINGS OF 2ND IEEE INTERNATIONAL CONFERENCE ON ENGINEERING & TECHNOLOGY ICETECH-2016, P1, DOI 10.1109/ICETECH.2016.7569180
  • [8] Kaur M., 2012, IOSR J COMPUTER ENG, V1, P31
  • [9] Kranthikumar B, 2020, J Xi'an Univ Archit Technol, V7, P800
  • [10] Detecting Web Attacks Using Multi-Stage Log Analysis
    Moh, Melody
    Pininti, Santhosh
    Doddapaneni, Sindhusha
    Moh, Teng-Sheng
    [J]. 2016 IEEE 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (IACC), 2016, : 733 - 738