Visible to the public Multi-source Data Analysis and Evaluation of Machine Learning Techniques for SQL Injection Detection

TitleMulti-source Data Analysis and Evaluation of Machine Learning Techniques for SQL Injection Detection
Publication TypeConference Paper
Year of Publication2018
AuthorsRoss, Kevin, Moh, Melody, Moh, Teng-Sheng, Yao, Jason
Conference NameProceedings of the ACMSE 2018 Conference
Date PublishedMarch 2018
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-5696-1
Keywordscomposability, defense, machine learning, Metrics, network intrusion detection, pubcrawl, resilience, Resiliency, SQL Injection, Zero day attacks
Abstract

SQL Injection continues to be one of the most damaging security exploits in terms of personal information exposure as well as monetary loss. Injection attacks are the number one vulnerability in the most recent OWASP Top 10 report, and the number of these attacks continues to increase. Traditional defense strategies often involve static, signature-based IDS (Intrusion Detection System) rules which are mostly effective only against previously observed attacks but not unknown, or zero-day, attacks. Much current research involves the use of machine learning techniques, which are able to detect unknown attacks, but depending on the algorithm can be costly in terms of performance. In addition, most current intrusion detection strategies involve collection of traffic coming into the web application either from a network device or from the web application host, while other strategies collect data from the database server logs. In this project, we are collecting traffic from two points: at the web application host, and at a Datiphy appliance node located between the webapp host and the associated MySQL database server. In our analysis of these two datasets, and another dataset that is correlated between the two, we have been able to demonstrate that accuracy obtained with the correlated dataset using algorithms such as rule-based and decision tree are nearly the same as those with a neural network algorithm, but with greatly improved performance.

URLhttps://dl.acm.org/doi/10.1145/3190645.3190670
DOI10.1145/3190645.3190670
Citation Keyross_multi-source_2018