...
首页> 外文期刊>Journal of information security and applications >An ensemble classification-based approach to detect attack level of SQL injections
【24h】

An ensemble classification-based approach to detect attack level of SQL injections

机译:基于集群的基于分类的方法来检测SQL注入的攻击水平

获取原文
获取原文并翻译 | 示例
           

摘要

Sensitive data including identity information, passwords, financial and business processes belonging to the user are kept in the databases. These data can be obtained by attackers with malicious code added to SQL queries. The malicious and clean SQL queries are taken from OWASP dataset to ensure that the proposed approach effective and practical. The middleware application which is developed in this study analyzes these SQL queries instantly to prevent attackers from accessing sensitive data in databases. In order to provide protection, an ensemble classification algorithm is trained with 22 features which are obtained from queries containing malicious codes. The trained ensemble algorithm classifies queries as clean and malicious. For the first time in this study, malicious SQL injections are detected as simple, unified or lateral to determine the level of the cyber-attack. If the query is clean, the request is provided in the flow forwarding scheme, otherwise the query is blocked. If SQL injection is detected as simple, the SQL request is blocked. In other cases source IP address is blocked at different time intervals. The accuracy of the model maintains over 98% to detect SQL injections, and 92% to classify as simple, unified or lateral these attacks. This result demonstrates that the developed middleware application has an active role against simple, unified and lateral SQL Injection attacks which are so hard to detect and provides flexible decisions against the attacks.
机译:包含属于用户的身份信息,密码,财务和业务流程的敏感数据被保存在数据库中。这些数据可以通过攻击者使用,该攻击者添加到SQL查询中的恶意代码。恶意和清洁的SQL查询取自OWASP数据集,以确保提出的方法有效和实用。在本研究中开发的中间件应用程序立即分析了这些SQL查询,以防止攻击者访问数据库中的敏感数据。为了提供保护,有22个功能培训了合并分类算法,该特征是从包含恶意代码的查询获得的22个特征。训练有素的合奏算法将查询分类为干净和恶意。在本研究中首次,检测到恶意SQL注射作为简单,统一或横向以确定网络攻击的水平。如果查询清洁,则在流转发方案中提供请求,否则查询被阻止。如果检测到SQL注入为简单,则会阻止SQL请求。在其他情况下,源IP地址以不同的时间间隔阻止。模型的准确性维持98%以检测SQL注入,92%分类为简单,统一或横向这些攻击。该结果表明,发达的中间件应用程序对抗简单,统一和横向的SQL注入攻击具有积极作用,这很难检测并提供针对攻击的灵活决策。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号