SQLi-Fuzzer: A SQL Injection Vulnerability Discovery Framework Based on Machine Learning

Author(s):  
Yunheng Luo
Author(s):  
Tetiana Naumenko ◽  
Vadym Chernomaz

Introduction. The widespread use of the Internet leads to a fast increase of the quantity of data that goes into it. This generates interest in intruders which try different approaches to steal this data. One of the most popular approaches is SQL injection. There are a lot of measures which help to prevent and decrease the risk of being subjected to this attack: usage of code analysis tools, usage of firewalls which can filter dangerous traffic etc. Usage of reverse proxy is analysed in this article, which with the help of machine learning algorithms checks requests for SQL injections and based on the result passes or forbids the request to go. It is worth mentioning that such a solution is not a replacement of human expertise but addition to it, which with the help of big data can give an accurate result in most cases. The purpose of the paper is to analyse and show effectiveness of usage of machine learning in information system security provisioning tasks with the system working in serverless architecture. Results. A system is designed and developed which with the help of machine learning classifies received requests. The system is deployed to the cloud hosting Google Cloud Platform and integrated into an application which is designed according to the serverless architecture principles. Multiple algorithms were used to compare effectiveness of the system and percentage of successful results were calculated for each of them. Also, an average time of request execution is calculated for each algorithm. Conclusions. Each algorithm’s result of successful request classification is above 90% which is considered to be more than acceptable. The result can be improved using more data to train machine learning models. The system fits for work in serverless applications thanks to the simplicity of its integration but it should be considered if it fits from a hardware rent point of view. Keywords: machine learning, Google Cloud Platform, security, SQL injection.


2021 ◽  
Author(s):  
Eman Hosam ◽  
Hagar Hosny ◽  
Walaa Ashraf ◽  
Ahmed S. Kaseb

Sign in / Sign up

Export Citation Format

Share Document