Fixed Attribute Value Removal Method and Anomaly Based Profiled Method, An SQLi Detection Effectiveness Study

In this work, performance of two existing SQL injection detection methods is compared and analysed together. The first existing method uses removal of SQL query attribute values method, and the other one uses database profiling technique in detecting malicious SQL query in SQL injection attacks. Bot...

Full description

Bibliographic Details
Published in:2021 International Conference on Data Science and Its Applications, ICoDSA 2021
Main Author: Kamaruzman S.A.; Isnin I.F.; Din M.M.
Format: Conference paper
Language:English
Published: Institute of Electrical and Electronics Engineers Inc. 2021
Online Access:https://www.scopus.com/inward/record.uri?eid=2-s2.0-85123414856&doi=10.1109%2fICoDSA53588.2021.9617523&partnerID=40&md5=664395f5386538ed50e17a9484dd6bb5
id 2-s2.0-85123414856
spelling 2-s2.0-85123414856
Kamaruzman S.A.; Isnin I.F.; Din M.M.
Fixed Attribute Value Removal Method and Anomaly Based Profiled Method, An SQLi Detection Effectiveness Study
2021
2021 International Conference on Data Science and Its Applications, ICoDSA 2021


10.1109/ICoDSA53588.2021.9617523
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85123414856&doi=10.1109%2fICoDSA53588.2021.9617523&partnerID=40&md5=664395f5386538ed50e17a9484dd6bb5
In this work, performance of two existing SQL injection detection methods is compared and analysed together. The first existing method uses removal of SQL query attribute values method, and the other one uses database profiling technique in detecting malicious SQL query in SQL injection attacks. Both detection method algorithms are implemented and tested using SQL query log generated from DVWA and Mutillidae web applications. Analysis and evaluation from results of the experiment showed that detection method based on the considered database profiling method is found to be much flexible and more effective. Nevertheless, it was found that the former method still has some room of improvement that could be done. Therefore, improvement on the former method is proposed that increase the effectiveness of the method to distinguish non-malicious query and the malicious query during the SQL injection detection process. © 2021 IEEE.
Institute of Electrical and Electronics Engineers Inc.

English
Conference paper

author Kamaruzman S.A.; Isnin I.F.; Din M.M.
spellingShingle Kamaruzman S.A.; Isnin I.F.; Din M.M.
Fixed Attribute Value Removal Method and Anomaly Based Profiled Method, An SQLi Detection Effectiveness Study
author_facet Kamaruzman S.A.; Isnin I.F.; Din M.M.
author_sort Kamaruzman S.A.; Isnin I.F.; Din M.M.
title Fixed Attribute Value Removal Method and Anomaly Based Profiled Method, An SQLi Detection Effectiveness Study
title_short Fixed Attribute Value Removal Method and Anomaly Based Profiled Method, An SQLi Detection Effectiveness Study
title_full Fixed Attribute Value Removal Method and Anomaly Based Profiled Method, An SQLi Detection Effectiveness Study
title_fullStr Fixed Attribute Value Removal Method and Anomaly Based Profiled Method, An SQLi Detection Effectiveness Study
title_full_unstemmed Fixed Attribute Value Removal Method and Anomaly Based Profiled Method, An SQLi Detection Effectiveness Study
title_sort Fixed Attribute Value Removal Method and Anomaly Based Profiled Method, An SQLi Detection Effectiveness Study
publishDate 2021
container_title 2021 International Conference on Data Science and Its Applications, ICoDSA 2021
container_volume
container_issue
doi_str_mv 10.1109/ICoDSA53588.2021.9617523
url https://www.scopus.com/inward/record.uri?eid=2-s2.0-85123414856&doi=10.1109%2fICoDSA53588.2021.9617523&partnerID=40&md5=664395f5386538ed50e17a9484dd6bb5
description In this work, performance of two existing SQL injection detection methods is compared and analysed together. The first existing method uses removal of SQL query attribute values method, and the other one uses database profiling technique in detecting malicious SQL query in SQL injection attacks. Both detection method algorithms are implemented and tested using SQL query log generated from DVWA and Mutillidae web applications. Analysis and evaluation from results of the experiment showed that detection method based on the considered database profiling method is found to be much flexible and more effective. Nevertheless, it was found that the former method still has some room of improvement that could be done. Therefore, improvement on the former method is proposed that increase the effectiveness of the method to distinguish non-malicious query and the malicious query during the SQL injection detection process. © 2021 IEEE.
publisher Institute of Electrical and Electronics Engineers Inc.
issn
language English
format Conference paper
accesstype
record_format scopus
collection Scopus
_version_ 1809677895026606080