Solomon Uwagbole
Applied web traffic analysis for numerical encoding of SQL Injection attack features
Uwagbole, Solomon; Buchanan, William; Fan, Lu
Abstract
SQL Injection Attack (SQLIA) remains a technique used by a computer network intruder to pilfer an organisation’s confidential data. This is done by an intruder re-crafting web form’s input and query strings used in web requests with malicious intent to compromise the security of an organisation’s confidential data stored at the back-end database. The database is the most valuable data source, and thus, intruders are unrelenting in constantly evolving new techniques to bypass the signature’s solutions currently provided in Web Application Firewalls (WAF) to mitigate SQLIA.
There is therefore a need for an automated scalable methodology in the pre-processing of SQLIA features fit for a supervised learning model. However, obtaining a ready-made scalable dataset that is feature engineered with numerical attributes dataset items to train Artificial Neural Network (ANN) and Machine Leaning (ML) models is a known issue in applying artificial intelligence to effectively address ever evolving novel SQLIA signatures.
This proposed approach applies numerical attributes encoding ontology to encode features (both legitimate web requests and SQLIA) to numerical data items as to extract scalable dataset for input to a supervised learning model in moving towards a ML SQLIA detection and prevention model. In numerical attributes encoding of features, the proposed model explores a hybrid of static and dynamic pattern matching by implementing a Non-Deterministic Finite Automaton (NFA). This combined with proxy and SQL parser Application Programming Interface (API) to intercept and parse web requests in transition to the back-end database. In developing a solution to address SQLIA, this model allows processed web requests at the proxy deemed to contain injected query string to be excluded from reaching the target back-end database.
This paper is intended for evaluating the performance metrics of a dataset obtained by numerical encoding of features ontology in Microsoft Azure Machine Learning (MAML) studio using Two-Class Support Vector Machines (TCSVM) binary classifier. This methodology then forms the subject of the empirical evaluation.
Citation
Uwagbole, S., Buchanan, W., & Fan, L. (2016, July). Applied web traffic analysis for numerical encoding of SQL Injection attack features. Presented at 15th European Conference on Cyber Warfare and Security ECCWS-2016
Presentation Conference Type | Conference Paper (published) |
---|---|
Conference Name | 15th European Conference on Cyber Warfare and Security ECCWS-2016 |
Start Date | Jul 7, 2016 |
End Date | Jul 8, 2016 |
Publication Date | Jul 7, 2016 |
Deposit Date | Jul 5, 2016 |
Publicly Available Date | Jul 7, 2016 |
Peer Reviewed | Peer Reviewed |
Book Title | ECCWS-2016 |
ISBN | 9781910810934 |
Keywords | SQL injection; SQLIA; numerical encoding; input neurons; azure machine learning; training data; |
Public URL | http://researchrepository.napier.ac.uk/id/eprint/10318 |
Publisher URL | https://dl.acm.org/citation.cfm?id=3055937 |
Files
Applied Web Traffic Analysis For Numerical Encoding Of SQL Injection Attack Features
(898 Kb)
PDF
Publisher Licence URL
http://creativecommons.org/licenses/by-nc-nd/4.0/
You might also like
Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains
(2024)
Journal Article
A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder
(2023)
Journal Article
Downloadable Citations
About Edinburgh Napier Research Repository
Administrator e-mail: repository@napier.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search