Abstract
Nowadays, the information technologies are profoundly affecting the way we produce and live. At the same time, various security threats in the cyberspace are constantly causing various security problems, such as SQL injection. Traditional SQL injection detection methods are often difficult to obtain good detection performance under actual circumstances. This paper models the SQL injection detection problem as a classification problem based on the mainstream LSTM model, CNN model and tries to combine and compare the training results to improve the detection accuracy. Also, the convolution neural network model based on attention is adopted for data representation. Experiments are carried out to demonstrate the performance of the proposed method.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Dangi, D., Bhagat, A., Dixit, D.K.: Emerging applications of artificial intelligence, machine learning and data science. Comput. Mater. Continua 70(3), 5399–5419 (2022)
Chen, X., Zhang, H., Luo, H.L.: Huang: Research on SQL injection attack and its prevention and detection technology. Comput. Eng. Appl. 43(11), 4 (2007)
Kai, Y., Lei, J., Chen, Y., Wei, X.: Deep learning: yesterday, today, and tomorrow. J. Comput. Res. Dev. 20(6), 1349 (2013)
Halfond, W.G., Viegas, J., Orso, A.: A classification of SQL-injection attacks and counter- measures, vol. 1, pp. 13–15. IEEE (2006)
Qing, G., Guo, F., Yu, M.: A static analysis method against SQL injection. Comput. Eng. Sci. 35(2), 68–73 (2013)
Prabhavathy, M., Umamaheswari, S.: Prevention of runtime malware injection attack in cloud using unsupervised learning. Intell. Autom. Soft Comput. 32(1), 101–114 (2022)
Sha, M., Alameen, A.: Functionality aware dynamic composition of web services. Comput. Syst. Sci. Eng. 36(1), 201–211 (2021)
Li, X., Sun, J., Chen, H.: Application of program analysis technology in SQL injection defense. Minicomput. Syst. 32(6), 1089–1093 (2011)
Nkenyereye, L., Tama, B.A., Lim, S.: A stacking-based deep neural network approach for effective network anomaly detection. Comput. Mater. Continua 66(2), 2217–2227 (2021)
Awad, N.A.: Enhancing network intrusion detection model using machine learning algorithms. Comput. Mater. Continua 67(1), 979–990 (2021)
Goldberg, Y., Levy, O.: Word2vec explained: deriving Mikolov et al.‘s negative-sampling word-embedding method. arXiv:1402.3722 (2014)
Xie, X., Ren, C., Chen, X.: SQL injection detection based on CNN. Comput. Netw. 46(3), 3–3 (2020)
Gers, F.A., Schmidhuber, E.: LSTM recurrent networks learn simple context-free and context-sensitive languages. J. Comput. Res. Dev. 12(6), 1333–1340 (2001)
Francisco, O., Daniel, R.: Deep convolutional and lstm recurrent neural networks for multimodal wearable activity recognition. In: word2vec Parameter Learning Explained, vol. 16, p. 115 (2014)
Alotaibi, Y.: A new database intrusion detection approach based on hybrid meta-heuristics. J. Inf. Hiding Priv. Prot. 66(2), 23–33 (2019)
Kim, J., Shah, B., Kim, K.: Hybrid deep learning architecture to forecast maximum load duration using time-of-use pricing plans. Comput. Mater. Continua 68(1), 283–301 (2021)
Wang, C., Zhao, S., He, Y., Gu, O., Alfarraj, L.: log unsupervised anomaly detection based on word2vec. Comput. Syst. Sci. Eng. 41(3), 1207–1222 (2022)
Assiri, A.: Anomaly classification using genetic algorithm-based random forest model for network attack detection. Comput. Mater. Continua 66(1), 767–778 (2021)
Huang, Z., Wei, X., Kai, Y.: Bidirectional lstm-crf models for sequence Tagging. In: Computer Science (2015
Gu, Y., Chen, B., Xu, C., Zhang, Y., Shi, J.: Deep learning trackers review and challenge. J. Inf. Hiding Priv. Prot. 1(1), 23 (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Shi, W., Liu, X. (2022). Research on SQL Injection Defense Technology Based on Deep Learning. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2022. Lecture Notes in Computer Science, vol 13339. Springer, Cham. https://doi.org/10.1007/978-3-031-06788-4_45
Download citation
DOI: https://doi.org/10.1007/978-3-031-06788-4_45
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-06787-7
Online ISBN: 978-3-031-06788-4
eBook Packages: Computer ScienceComputer Science (R0)