Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Data-mining based SQL injection attack detection using internal query trees

Full metadata record
DC Field Value Language
dc.contributor.authorKim, Mi-Yeon-
dc.contributor.authorLee, Dong Hoon-
dc.date.accessioned2021-09-05T05:30:23Z-
dc.date.available2021-09-05T05:30:23Z-
dc.date.created2021-06-15-
dc.date.issued2014-09-01-
dc.identifier.issn0957-4174-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/97445-
dc.description.abstractDetecting SQL injection attacks (SQLIAs) is becoming increasingly important in database-driven web sites. Until now, most of the studies on SQLIA detection have focused on the structured query language (SQL) structure at the application level. Unfortunately, this approach inevitably fails to detect those attacks that use already stored procedure and data within the database system. In this paper, we propose a framework to detect SQLIAs at database level by using SVM classification and various kernel functions. The key issue of SQLIA detection framework is how to represent the internal query tree collected from database log suitable for SVM classification algorithm in order to acquire good performance in detecting SQLIAs. To solve the issue, we first propose a novel method to convert the query tree into an n-dimensional feature vector by using a multi-dimensional sequence as an intermediate representation. The reason that it is difficult to directly convert the query tree into an n-dimensional feature vector is the complexity and variability of the query tree structure. Second, we propose a method to extract the syntactic features, as well as the semantic features when generating feature vector. Third, we propose a method to transform string feature values into numeric feature values, combining multiple statistical models. The combined model maps one string value to one numeric value by containing the multiple characteristic of each string value. In order to demonstrate the feasibility of our proposals in practical environments, we implement the SQUA detection system based on PostgreSQL, a popular open source database system, and we perform experiments. The experimental results using the internal query trees of PostgreSQL validate that our proposal is effective in detecting SQLIAs, with at least 99.6% of the probability that the probability for malicious queries to be correctly predicted as SQLIA is greater than the probability for normal queries to be incorrectly predicted as SQUA. Finally, we perform additional experiments to compare our proposal with syntax-focused feature extraction and single statistical model based on feature transformation. The experimental results show that our proposal significantly increases the probability of correctly detecting SQLIAs for various SQL statements, when compared to the previous methods. (C) 2014 Elsevier Ltd. All rights reserved.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherPERGAMON-ELSEVIER SCIENCE LTD-
dc.titleData-mining based SQL injection attack detection using internal query trees-
dc.typeArticle-
dc.contributor.affiliatedAuthorLee, Dong Hoon-
dc.identifier.doi10.1016/j.eswa.2014.02.041-
dc.identifier.scopusid2-s2.0-84898424321-
dc.identifier.wosid000336191800035-
dc.identifier.bibliographicCitationEXPERT SYSTEMS WITH APPLICATIONS, v.41, no.11, pp.5416 - 5430-
dc.relation.isPartOfEXPERT SYSTEMS WITH APPLICATIONS-
dc.citation.titleEXPERT SYSTEMS WITH APPLICATIONS-
dc.citation.volume41-
dc.citation.number11-
dc.citation.startPage5416-
dc.citation.endPage5430-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaOperations Research & Management Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Artificial Intelligence-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryOperations Research & Management Science-
dc.subject.keywordAuthorIntrusion detection-
dc.subject.keywordAuthorSQL injection attack-
dc.subject.keywordAuthorDatabase-
dc.subject.keywordAuthorData mining-
dc.subject.keywordAuthorSVM-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Dong Hoon photo

Lee, Dong Hoon
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE