2019
DOI: 10.13164/mendel.2019.1.023
|View full text |Cite
|
Sign up to set email alerts
|

Machine Learning Blunts the Needle of Advanced SQL Injections

Abstract: SQL injection is one of the most popular and serious information security threats. By exploiting database vulnerabilities, attackers may get access to sensitive data or enable compromised computers to conduct further network attacks. Our research is focused on applying machine learning approaches for identication of injection characteristics in the HTTP query string. We compare results from Rule-based Intrusion Detection System, Support Vector Machines, Multilayer Perceptron, Neural Network with Dropout layers… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 14 publications
0
5
0
Order By: Relevance
“…With the assistance of IDSs, [107] and [108] presented different approaches. For instance, Ross et al [107] work by capturing request data in two points: first in web application using snort IDS and save data in PCAP file.…”
Section: ) Sql Injectionmentioning
confidence: 99%
See 1 more Smart Citation
“…With the assistance of IDSs, [107] and [108] presented different approaches. For instance, Ross et al [107] work by capturing request data in two points: first in web application using snort IDS and save data in PCAP file.…”
Section: ) Sql Injectionmentioning
confidence: 99%
“…These two datasets process using bash shell scripts and save into one file to create the correlated dataset. Volkova et al [108] applied ML approaches for identifying SQLI in the HTTP query string. They compare results from SVMs, Rule-based IDS, Neural Network with Dropout layers, Multilayer Perceptron (MLP), and Deep Sequential Models (Gated Recurrent Units, and Long Short-Term Memory) using bag-of-word techniques, word embedding for query string vectorization, and multiple string analysis.…”
Section: ) Sql Injectionmentioning
confidence: 99%
“…The extracted feature is then accepted by the ML classifier, which trains the model to identify the injected query. The SVM [103,104], DT, NB [73,105,106], and other algorithms in ML techniques [75,[107][108][109][110][111] are used to solve classification algorithms. The trained model passes all stages such as preprocessing and feature extraction.…”
Section: Nature Of Attack Recommended Techniquementioning
confidence: 99%
“…11 explains ZAP has obtained and collected the results as evidence of response messages that come from scanning the Application, so the scanning process using ZAP will explain to us about valuable information relating to vulnerabilities. 11 https://en.wikipedia.org/wiki/Apache_HTTP_Server 12 https://en.wikipedia.org/wiki/MySQL 13 https://en.wikipedia.org/wiki/Web_application 14 https://en.wikipedia.org/wiki/XAMPP 2) Arachni reports as a whole that recorded on the results of the webserver scan with a report explaining starting from the base URL to the web application directory in Fig. 12.…”
Section: B Examinationmentioning
confidence: 99%
“…Even though the web server is physically protected, web applications that run in the environment are not protected from attacks through computer networks. The attacks referred to according to OWASP Top 10-2017 among other things, Injection Weaknesses such as SQL injection 5 , NoSQL 6 , OS 7 , and LDAP 8 are caused when fake data is sent to the server as part of the order [11].…”
Section: Introductionmentioning
confidence: 99%