Skip to main content

Research on SQL Injection Defense Technology Based on Deep Learning

  • Conference paper
  • First Online:
Book cover Artificial Intelligence and Security (ICAIS 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13339))

Included in the following conference series:

  • 1099 Accesses

Abstract

Nowadays, the information technologies are profoundly affecting the way we produce and live. At the same time, various security threats in the cyberspace are constantly causing various security problems, such as SQL injection. Traditional SQL injection detection methods are often difficult to obtain good detection performance under actual circumstances. This paper models the SQL injection detection problem as a classification problem based on the mainstream LSTM model, CNN model and tries to combine and compare the training results to improve the detection accuracy. Also, the convolution neural network model based on attention is adopted for data representation. Experiments are carried out to demonstrate the performance of the proposed method.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Dangi, D., Bhagat, A., Dixit, D.K.: Emerging applications of artificial intelligence, machine learning and data science. Comput. Mater. Continua 70(3), 5399–5419 (2022)

    Article  Google Scholar 

  2. Chen, X., Zhang, H., Luo, H.L.: Huang: Research on SQL injection attack and its prevention and detection technology. Comput. Eng. Appl. 43(11), 4 (2007)

    Google Scholar 

  3. Kai, Y., Lei, J., Chen, Y., Wei, X.: Deep learning: yesterday, today, and tomorrow. J. Comput. Res. Dev. 20(6), 1349 (2013)

    Google Scholar 

  4. Halfond, W.G., Viegas, J., Orso, A.: A classification of SQL-injection attacks and counter- measures, vol. 1, pp. 13–15. IEEE (2006)

    Google Scholar 

  5. Qing, G., Guo, F., Yu, M.: A static analysis method against SQL injection. Comput. Eng. Sci. 35(2), 68–73 (2013)

    Google Scholar 

  6. Prabhavathy, M., Umamaheswari, S.: Prevention of runtime malware injection attack in cloud using unsupervised learning. Intell. Autom. Soft Comput. 32(1), 101–114 (2022)

    Article  Google Scholar 

  7. Sha, M., Alameen, A.: Functionality aware dynamic composition of web services. Comput. Syst. Sci. Eng. 36(1), 201–211 (2021)

    Article  Google Scholar 

  8. Li, X., Sun, J., Chen, H.: Application of program analysis technology in SQL injection defense. Minicomput. Syst. 32(6), 1089–1093 (2011)

    Google Scholar 

  9. Nkenyereye, L., Tama, B.A., Lim, S.: A stacking-based deep neural network approach for effective network anomaly detection. Comput. Mater. Continua 66(2), 2217–2227 (2021)

    Article  Google Scholar 

  10. Awad, N.A.: Enhancing network intrusion detection model using machine learning algorithms. Comput. Mater. Continua 67(1), 979–990 (2021)

    Article  Google Scholar 

  11. Goldberg, Y., Levy, O.: Word2vec explained: deriving Mikolov et al.‘s negative-sampling word-embedding method. arXiv:1402.3722 (2014)

  12. Xie, X., Ren, C., Chen, X.: SQL injection detection based on CNN. Comput. Netw. 46(3), 3–3 (2020)

    Google Scholar 

  13. Gers, F.A., Schmidhuber, E.: LSTM recurrent networks learn simple context-free and context-sensitive languages. J. Comput. Res. Dev. 12(6), 1333–1340 (2001)

    Google Scholar 

  14. Francisco, O., Daniel, R.: Deep convolutional and lstm recurrent neural networks for multimodal wearable activity recognition. In: word2vec Parameter Learning Explained, vol. 16, p. 115 (2014)

    Google Scholar 

  15. Alotaibi, Y.: A new database intrusion detection approach based on hybrid meta-heuristics. J. Inf. Hiding Priv. Prot. 66(2), 23–33 (2019)

    Google Scholar 

  16. Kim, J., Shah, B., Kim, K.: Hybrid deep learning architecture to forecast maximum load duration using time-of-use pricing plans. Comput. Mater. Continua 68(1), 283–301 (2021)

    Article  Google Scholar 

  17. Wang, C., Zhao, S., He, Y., Gu, O., Alfarraj, L.: log unsupervised anomaly detection based on word2vec. Comput. Syst. Sci. Eng. 41(3), 1207–1222 (2022)

    Article  Google Scholar 

  18. Assiri, A.: Anomaly classification using genetic algorithm-based random forest model for network attack detection. Comput. Mater. Continua 66(1), 767–778 (2021)

    Article  Google Scholar 

  19. Huang, Z., Wei, X., Kai, Y.: Bidirectional lstm-crf models for sequence Tagging. In: Computer Science (2015

    Google Scholar 

  20. Gu, Y., Chen, B., Xu, C., Zhang, Y., Shi, J.: Deep learning trackers review and challenge. J. Inf. Hiding Priv. Prot. 1(1), 23 (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaoqian Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shi, W., Liu, X. (2022). Research on SQL Injection Defense Technology Based on Deep Learning. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2022. Lecture Notes in Computer Science, vol 13339. Springer, Cham. https://doi.org/10.1007/978-3-031-06788-4_45

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-06788-4_45

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-06787-7

  • Online ISBN: 978-3-031-06788-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics