SciELO - Scientific Electronic Library Online

 
vol.51 issue2Fragility Analysis of One of the Most Relevant Structural Typologies in Quito. TREQ-GEM.ProjectStudy of Polylactic Acid - Achira Starch Blends Compatibilized by Polyvinyl Alcohol author indexsubject indexarticles search
Home Pagealphabetic serial listing  

Services on Demand

Journal

Article

Indicators

Related links

  • Have no similar articlesSimilars in SciELO

Share


Revista Politécnica

On-line version ISSN 2477-8990Print version ISSN 1390-0129

Abstract

ANASCO, Cesar; MOROCHO, Karen  and  HALLO, María. Using Data Mining Techniques for the Detection of SQL Injection Attacks on Database Systems. Rev Politéc. (Quito) [online]. 2023, vol.51, n.2, pp.19-28. ISSN 2477-8990.  https://doi.org/10.33333/rp.vol51n2.02.

In any business organization, database infrastructures are subject to various structured query language (SQL) injection attacks, such as tautologies, alternative coding, stored procedures, use of the union operator, piggyback, among others. This article describes a data mining project developed to mitigate the problem of identifying SQL injection attacks on databases. The project was conducted using an adaptation of the cross-industry standard process for data mining (CRISP-DM) methodology. A total of 12 python libraries was used for cleaning, transformation, and modeling. The anomaly detection model was carried out using clustering by the k - nearest neighbors (kNN) algorithm. The query text was analyzed for the groups with anomalies to identify sentences presenting attack traces. A web interface was implemented to display the daily summary of the attacks found. The information source was obtained from the transactions log of a PostgreSQL database server. Our results allowed the identification of different attacks by injection of SQL code above 80%. The execution time for processing half a million transaction log was approximately 60 minutes using a computer with the following characteristics: Intel® Core i7 processor 7th generation, 12GB RAM and 500GB SSD.

Keywords : Log; Database Attacks; Anomalies; Queries; CRISP-DM; IDS (Intrusion Detection Systems).

        · abstract in Spanish     · text in Spanish     · Spanish ( pdf )