Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Data-mining based SQL injection attack detection using internal query trees

Authors
Kim, Mi-YeonLee, Dong Hoon
Issue Date
1-Sep-2014
Publisher
PERGAMON-ELSEVIER SCIENCE LTD
Keywords
Intrusion detection; SQL injection attack; Database; Data mining; SVM
Citation
EXPERT SYSTEMS WITH APPLICATIONS, v.41, no.11, pp.5416 - 5430
Indexed
SCIE
SCOPUS
Journal Title
EXPERT SYSTEMS WITH APPLICATIONS
Volume
41
Number
11
Start Page
5416
End Page
5430
URI
https://scholar.korea.ac.kr/handle/2021.sw.korea/97445
DOI
10.1016/j.eswa.2014.02.041
ISSN
0957-4174
Abstract
Detecting SQL injection attacks (SQLIAs) is becoming increasingly important in database-driven web sites. Until now, most of the studies on SQLIA detection have focused on the structured query language (SQL) structure at the application level. Unfortunately, this approach inevitably fails to detect those attacks that use already stored procedure and data within the database system. In this paper, we propose a framework to detect SQLIAs at database level by using SVM classification and various kernel functions. The key issue of SQLIA detection framework is how to represent the internal query tree collected from database log suitable for SVM classification algorithm in order to acquire good performance in detecting SQLIAs. To solve the issue, we first propose a novel method to convert the query tree into an n-dimensional feature vector by using a multi-dimensional sequence as an intermediate representation. The reason that it is difficult to directly convert the query tree into an n-dimensional feature vector is the complexity and variability of the query tree structure. Second, we propose a method to extract the syntactic features, as well as the semantic features when generating feature vector. Third, we propose a method to transform string feature values into numeric feature values, combining multiple statistical models. The combined model maps one string value to one numeric value by containing the multiple characteristic of each string value. In order to demonstrate the feasibility of our proposals in practical environments, we implement the SQUA detection system based on PostgreSQL, a popular open source database system, and we perform experiments. The experimental results using the internal query trees of PostgreSQL validate that our proposal is effective in detecting SQLIAs, with at least 99.6% of the probability that the probability for malicious queries to be correctly predicted as SQLIA is greater than the probability for normal queries to be incorrectly predicted as SQUA. Finally, we perform additional experiments to compare our proposal with syntax-focused feature extraction and single statistical model based on feature transformation. The experimental results show that our proposal significantly increases the probability of correctly detecting SQLIAs for various SQL statements, when compared to the previous methods. (C) 2014 Elsevier Ltd. All rights reserved.
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Dong Hoon photo

Lee, Dong Hoon
Department of Information Security
Read more

Altmetrics

Total Views & Downloads

BROWSE