SQL Injection Attack Detection Based on Similarity Matching Between Vectors Extracted From Design Time and Run-Time Queries

Journal Title: International Journal of Experimental Research and Review - Year 2024, Vol 42, Issue 6

Abstract

Everyone uses web-based applications to carry out daily business and personal tasks. These programmes are vulnerable to attack by hackers, who may also misuse the data. The most serious attack with the greatest damaging potential on digital platforms is the structured query language injection attack (SQLiA). The backend databases could be corrupted or destroyed by SQLiA if it manages to breach security protections. Using SQLiA tactics, hackers can get unauthorized access, steal important data, and take over the network completely or partially. An automatic SQL injection prevention and detection technique is needed to safeguard web-based applications from SQLiA. This research suggests a novel similarity-matching algorithm of vectors extracted from design time and run-time queries. This technique allocates the weights of different SQL keywords used in design time and run-time queries and further design time and run-time vectors have been created from respective queries. The similarity between the design time and run time vector is determined by calculating the angle between these two vectors. The angle of deviation between the design time vector and run time vector is calculated and if the angle of deviation is zero, then it is concluded as no SQL injection otherwise, it indicates the existence of SQLiA vulnerability. The proposed algorithm is validated against the GitHub dataset. In the first dataset, out of 1300 injected queries, the proposed method identifies 1219 injected queries; out of 300 normal queries, it identifies 290 normal queries with 93.76% and 96.66% detection accuracy, respectively. Similarly, for the second dataset, out of 10489 injected queries, it identifies 10280 injected queries and out of 301 normal queries, it identifies 280 normal queries with 98.01% and 93.02% detection accuracy, respectively.

Authors and Affiliations

Jayanto Kumar Chowdhury, Dilip Kumar Yadav, Chandra Mouli P. V. S. S. R

Keywords

Related Articles

Effects of Vit-C on the activities of Acetylcholine esterase and aminotransferases in Dimecron intoxicated developing chick embryos

When organophosphate insecticide, dimecron introduced into the fertilized hen’s egg at a certain dose before incubation it shows a characteristic and interesting feature which has been studied in different developmental...

Predictive risk assessment of a common food additive monosodium glutamate : An in vivo biochemical, patho-physiological and molecular study

Monosodium glutamate (MSG) is a popular food additive commonly known as Ajinomoto, which has a flavour enhancing effect on food. We investigated if the MSG has any potential to alter kidney and liver function and biochem...

Validated Stability Indicating UHPLC Method for the Quantification of Escitalopram and Flupentixol in Pharmaceutical Formulation

To assess Escitalopram and flupentixol simultaneously, a verified method for ultra-phase high-performance liquid chromatography (UHPLC) has been developed to indicate stability. The method was thoroughly evaluated and me...

A Hybrid Framework for Plant Leaf Region Segmentation: Comparative Analysis of Swarm Intelligence with Convolutional Neural Networks

Agriculture is important for the survival of humanity since about 70% of the world's population is engaged in agricultural pursuits to varying degrees. The previous and present methodology lacks ways to identify diseases...

An alarming public health concern over variability in herbal compositions of marketed immunity booster products during COVID-19: A botanical survey-based study

The world is going through pandemic of the century named COVID-19 disease. The COVID-19 pathogenesis involves cytokine storm in advanced stage leading to systemic hyper-inflammation. Medicinal herbs are practiced as part...

Download PDF file
  • EP ID EP743567
  • DOI 10.52756/ijerr.2024.v42.001
  • Views 10
  • Downloads 0

How To Cite

Jayanto Kumar Chowdhury, Dilip Kumar Yadav, Chandra Mouli P. V. S. S. R (2024). SQL Injection Attack Detection Based on Similarity Matching Between Vectors Extracted From Design Time and Run-Time Queries. International Journal of Experimental Research and Review, 42(6), -. https://europub.co.uk/articles/-A-743567