Services on Demand
Journal
Article
Indicators
- Cited by SciELO
- Access statistics
Related links
- Similars in SciELO
Share
Revista Politécnica
On-line version ISSN 2477-8990Print version ISSN 1390-0129
Abstract
ANASCO, Cesar; MOROCHO, Karen and HALLO, María. Using Data Mining Techniques for the Detection of SQL Injection Attacks on Database Systems. Rev Politéc. (Quito) [online]. 2023, vol.51, n.2, pp.19-28. ISSN 2477-8990. https://doi.org/10.33333/rp.vol51n2.02.
In any business organization, database infrastructures are subject to various structured query language (SQL) injection attacks, such as tautologies, alternative coding, stored procedures, use of the union operator, piggyback, among others. This article describes a data mining project developed to mitigate the problem of identifying SQL injection attacks on databases. The project was conducted using an adaptation of the cross-industry standard process for data mining (CRISP-DM) methodology. A total of 12 python libraries was used for cleaning, transformation, and modeling. The anomaly detection model was carried out using clustering by the k - nearest neighbors (kNN) algorithm. The query text was analyzed for the groups with anomalies to identify sentences presenting attack traces. A web interface was implemented to display the daily summary of the attacks found. The information source was obtained from the transactions log of a PostgreSQL database server. Our results allowed the identification of different attacks by injection of SQL code above 80%. The execution time for processing half a million transaction log was approximately 60 minutes using a computer with the following characteristics: Intel® Core i7 processor 7th generation, 12GB RAM and 500GB SSD.
Keywords : Log; Database Attacks; Anomalies; Queries; CRISP-DM; IDS (Intrusion Detection Systems).