Redirigiendo al acceso original de articulo en 16 segundos...
Inicio  /  Future Internet  /  Vol: 15 Par: 4 (2023)  /  Artículo
ARTÍCULO
TITULO

SSQLi: A Black-Box Adversarial Attack Method for SQL Injection Based on Reinforcement Learning

Yuting Guan    
Junjiang He    
Tao Li    
Hui Zhao and Baoqiang Ma    

Resumen

SQL injection is a highly detrimental web attack technique that can result in significant data leakage and compromise system integrity. To counteract the harm caused by such attacks, researchers have devoted much attention to the examination of SQL injection detection techniques, which have progressed from traditional signature-based detection methods to machine- and deep-learning-based detection models. These detection techniques have demonstrated promising results on existing datasets; however, most studies have overlooked the impact of adversarial attacks, particularly black-box adversarial attacks, on detection methods. This study addressed the shortcomings of current SQL injection detection techniques and proposed a reinforcement-learning-based black-box adversarial attack method. The proposal included an innovative vector transformation approach for the original SQL injection payload, a comprehensive attack-rule matrix, and a reinforcement-learning-based method for the adaptive generation of adversarial examples. Our approach was evaluated on existing web application firewalls (WAF) and detection models based on machine- and deep-learning methods, and the generated adversarial examples successfully bypassed the detection method at a rate of up to 97.39%. Furthermore, there was a substantial decrease in the detection accuracy of the model after multiple attacks had been carried out on the detection model via the adversarial examples.

 Artículos similares

       
 
João Vitorino, Nuno Oliveira and Isabel Praça    
Adversarial attacks pose a major threat to machine learning and to the systems that rely on it. In the cybersecurity domain, adversarial cyber-attack examples capable of evading detection are especially concerning. Nonetheless, an example generated for a... ver más
Revista: Future Internet

 
Zheng-Lian Su, Xun-Lin Jiang, Ning Li, Hai-Feng Ling and Yu-Jun Zheng    
Unmanned aerial vehicles (UAVs) have been widely used for target detection in modern battlefields. From the viewpoint of the opponents, false target jamming is an effective approach to decrease the UAV detection ability or probability, but currently ther... ver más
Revista: Drones

 
Hafiz Suliman Munawar, Fahim Ullah, Amirhossein Heravi, Muhammad Jamaluddin Thaheem and Ahsen Maqsoom    
Manual inspection of infrastructure damages such as building cracks is difficult due to the objectivity and reliability of assessment and high demands of time and costs. This can be automated using unmanned aerial vehicles (UAVs) for aerial imagery of da... ver más
Revista: Drones

 
Pooja Bidwai, Shilpa Gite, Kishore Pahuja and Ketan Kotecha    
Diabetic retinopathy occurs due to long-term diabetes with changing blood glucose levels and has become the most common cause of vision loss worldwide. It has become a severe problem among the working-age group that needs to be solved early to avoid visi... ver más

 
Victor Chang, Lewis Golightly, Paolo Modesti, Qianwen Ariel Xu, Le Minh Thao Doan, Karl Hall, Sreeja Boddu and Anna Kobusinska    
The rapid advancement of internet technologies has dramatically increased the number of connected devices. This has created a huge attack surface that requires the deployment of effective and practical countermeasures to protect network infrastructures f... ver más
Revista: Future Internet