Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3383972.3384028acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicmlcConference Proceedingsconference-collections
research-article

A Survey on SQL Injection Attacks, Detection and Prevention

Published: 26 May 2020 Publication History

Abstract

Since the uses of Web in daily life is increasing in past 20 years and becoming trend now, almost every Web application has its own database to store important data. An attacker can get or even modify the data from database through SQL injection vulnerability, so it is one of the most serious problems in Web application security. In this paper, we present a detailed review on various types of SQL injection attacks and detection techniques based on machine learning. we also propose future expectations and possible development of countermeasures against SQL injection vulnerability at the end of the article.

References

[1]
J. Abirami, R. Devakunchari and C. Valliyammai, "A top web security vulnerability SQL injection attack --- Survey," 2015 Seventh International Conference on Advanced Computing (ICoAC), Chennai, 2015, pp. 1--9.
[2]
N. Singh, M. Dayal, R. S. Raw and S. Kumar, "SQL injection: Types, methodology, attack queries and prevention," 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, 2016, pp. 2872--2876.
[3]
R. Johari and P. Sharma, "A Survey on Web Application Vulnerabilities (SQLIA, XSS) Exploitation and Security Engine for SQL Injection," 2012 International Conference on Communication Systems and Network Technologies, Rajkot, 2012, pp. 453--458.
[4]
D. A. Kindy and A. S. K. Pathan, "A survey on SQL injection: Vulnerabilities, attacks, and prevention techniques," 2011 IEEE 15th International Symposium on Consumer Electronics (ISCE), Singapore, 2011, pp. 468--471.
[5]
S. W. Boyd and A. D. Keromytis. SQLrand: Preventing SQL Injection Attacks. In Proceedings of the 2nd Applied Cryptography and Network Security Conference, pages 292--302, June 2004.
[6]
M. Junjin, "An Approach for SQL Injection Vulnerability Detection," Proc. of the 6th Int. Conf. on Information Technology: New Generations, Las Vegas, Nevada, pp. 1411--1414, April 2009.
[7]
P. Bisht, P. Madhusudan, and V. N. Venkatakrishnan. CANDID: Dynamic Candidate Evaluations for Automatic Prevention of SQL Injection Attacks. ACM Trans. Inf. Syst. Secur., 13(2): 1--39, 2010.
[8]
Anitha V., Supha Lakshmi A., Revathi M. and Selvi K., "Detecting various SQL Injection vulnerabilities using String Matching and LCS method," 2014 Sixth International Conference on Advanced Computing (ICoAC), Chennai, 2014, pp. 237--241.
[9]
A. Joshi and V. Geetha, "SQL Injection detection using machine learning," 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), Kanyakumari, 2014, pp. 1111--1115.
[10]
Z. Xiao, Z. Zhou, W. Yang and C. Deng, "An approach for SQL injection detection based on behavior and response analysis," 2017 IEEE 9th International Conference on Communication Software and Networks (ICCSN), Guangzhou, 2017, pp. 1437--1442.
[11]
Xie X, Ren C, Fu Y, et al. SQL Injection Detection for Web Applications Based on Elastic-Pooling CNN[J]. IEEE Access, 2019, 7: 151475--151481.
[12]
Li Q, Li W, Wang J, et al. A SQL Injection Detection Method Based on Adaptive Deep Forest[J]. IEEE Access, 2019, 7: 145385--145394.
[13]
Luo A, Huang W, Fan W. A CNN-based Approach to the Detection of SQL Injection Attacks[C]//2019 IEEE/ACIS 18th International Conference on Computer and Information Science (ICIS). IEEE, 2019: 320--324.
[14]
Li Q, Wang F, Wang J, et al. LSTM-Based SQL Injection Detection Method for Intelligent Transportation System[J]. IEEE Transactions on Vehicular Technology, 2019, 68(5): 4182--4191.
[15]
P. Kumar and R. K. Pateriya, "A survey on SQL injection attacks, detection and prevention techniques," Computing Communication & Networking Technologies (ICCCNT), 2012 Third International Conference on, Coimbatore, 2012, pp. 1--5.
[16]
Hasan J, Zeki A M, Alharam A, et al. Evaluation of SQL Injection Prevention Methods[C]//2019 8th International Conference on Modeling Simulation and Applied Optimization (ICMSAO). IEEE, 2019: 1--6.
[17]
L. K. Shar and H. B. K. Tan, "Defeating SQL Injection," in Computer, vol. 46, no. 3, pp. 69--77, March 2013.
[18]
Li Qian, Zhenyuan Zhu, Jun Hu and Shuying Liu, "Research of SQL injection attack and prevention technology," 2015 International Conference on Estimation, Detection and Information Fusion (ICEDIF), Harbin, 2015, pp. 303--306.

Cited By

View all
  • (2024)Continuous Monitoring of Web Server Assaults Using Machine Learning2024 Second International Conference on Emerging Trends in Information Technology and Engineering (ICETITE)10.1109/ic-ETITE58242.2024.10493548(1-5)Online publication date: 22-Feb-2024
  • (2023)Code Injection Attacks in Wireless-Based Internet of Things (IoT): A Comprehensive Review and Practical ImplementationsSensors10.3390/s2313606723:13(6067)Online publication date: 30-Jun-2023
  • (2023)Security Architecture for Secure Train Control and Monitoring SystemSensors10.3390/s2303134123:3(1341)Online publication date: 25-Jan-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICMLC '20: Proceedings of the 2020 12th International Conference on Machine Learning and Computing
February 2020
607 pages
ISBN:9781450376426
DOI:10.1145/3383972
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

In-Cooperation

  • Shenzhen University: Shenzhen University

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 May 2020

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Dynamic analysis
  2. SQL injection
  3. Static analysis
  4. Vulnerability detection

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICMLC 2020

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)119
  • Downloads (Last 6 weeks)5
Reflects downloads up to 31 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Continuous Monitoring of Web Server Assaults Using Machine Learning2024 Second International Conference on Emerging Trends in Information Technology and Engineering (ICETITE)10.1109/ic-ETITE58242.2024.10493548(1-5)Online publication date: 22-Feb-2024
  • (2023)Code Injection Attacks in Wireless-Based Internet of Things (IoT): A Comprehensive Review and Practical ImplementationsSensors10.3390/s2313606723:13(6067)Online publication date: 30-Jun-2023
  • (2023)Security Architecture for Secure Train Control and Monitoring SystemSensors10.3390/s2303134123:3(1341)Online publication date: 25-Jan-2023
  • (2023)A Machine Learning Methodology for Detecting SQL Injection Attacks2023 3rd International Conference on Technological Advancements in Computational Sciences (ICTACS)10.1109/ICTACS59847.2023.10390153(184-191)Online publication date: 1-Nov-2023
  • (2023)Detection of SQL Injection and Cross-Site Scripting Based on Multi-Model CNN Combined with Bidirectional GRU and Multi-Head Self-Attention2023 5th International Conference on Computer Communication and the Internet (ICCCI)10.1109/ICCCI59363.2023.10210155(142-150)Online publication date: 23-Jun-2023
  • (2022)Detection and prevention of SQLI attacks and developing compressive framework using machine learning and hybrid techniquesJournal of Big Data10.1186/s40537-022-00678-09:1Online publication date: 30-Dec-2022
  • (2022)A Secure Design Pattern Approach Toward Tackling Lateral-Injection Attacks2022 15th International Conference on Security of Information and Networks (SIN)10.1109/SIN56466.2022.9970499(01-04)Online publication date: 11-Nov-2022
  • (2022)SQL Injection Detection Using 2D-Convolutional Neural Networks (2D-CNN)2022 International Conference on Data Science and Intelligent Computing (ICDSIC)10.1109/ICDSIC56987.2022.10075777(212-217)Online publication date: 1-Nov-2022
  • (2022)A SQL Blind Injection Method Based on Gated Recurrent Neural Network2022 7th IEEE International Conference on Data Science in Cyberspace (DSC)10.1109/DSC55868.2022.00078(519-525)Online publication date: Jul-2022
  • (2022)Deep Learning Approach Based on ADASYN for Detection of Web Attacks in the CICIDS2017 DatasetRising Threats in Expert Applications and Solutions10.1007/978-981-19-1122-4_7(53-62)Online publication date: 4-Jul-2022
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media