Unlock instant, AI-driven research and patent intelligence for your innovation.

SQL injection attack detection method based on machine learning

A technology of injection attack and machine learning, applied in the field of big data analysis, can solve the problems of stealing or abusing data information, stealing money, consuming resources, etc., to protect system security, defend against malicious attacks, and improve recognition.

Inactive Publication Date: 2022-01-04
北京华清信安科技有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Criminals often use loopholes in the program to carry out network attacks, and the consequences of network attacks are usually very serious, such as stealing or abusing data information, causing server paralysis or even stealing money, etc.
In recent years, research on SQL injection detection has occasionally appeared, such as machine learning detection technology based on TF-IDF, but the feature vectors extracted by TF-IDF often have very large data dimensions, even reaching thousands of dimensions, which not only consumes resources, but also And the speed is slow; and the detection method based on deep learning, due to the complexity of the network structure, the calculation amount will be extremely large, which will also make the running speed very slow

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SQL injection attack detection method based on machine learning
  • SQL injection attack detection method based on machine learning
  • SQL injection attack detection method based on machine learning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0039] Such as figure 1 As shown, the present invention provides a kind of SQL injection attack detection method based on machine learning, and it comprises the following steps:

[0040] Step S1, obtaining sufficient labeled data is specifically: High-quality labeled sample data is the cornerstone of machine learning, but manual labeling of all data sets requires considerable time and labor costs. We can obtain a large number of business request data, but these The data has not been classified into normal and SQL injection. The present invention proposes to manually mark a small part of the data sets with obvious characteristics, and then calculate all the data with a similarity of more than 90% through the cosine similarity calculation, and mark them uniformly, so as to reduce the The cost of labeling data. Clean and preprocess the original request data; in order to reduce the noise of the data set, the original data needs to be cleaned, and the collected original data shoul...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an SQL injection attack detection method based on machine learning. The method comprises the following steps of 1, acquiring annotation data, and cleaning and preprocessing original request data; 2, feature extraction bring carried out on different parts of the request data, and extracted features comprising the weight of a frequent item set; the frequent items being obtained by mining a frequent item set in the SQL injection data through an FP-growth algorithm; 3, splicing the feature vectors obtained in the step 2 to obtain the feature vector of the whole data; 4, establishing an SVM detection model; inputting the feature vector of the whole data into an SVM detection model for training; and 5, inputting the feature vector of the to-be-detected request data into the trained SVM detection model, and judging whether the to-be-detected request data is SQL injection attack data or not with the assistance of the white list. The SQL injection attack can be effectively and quickly detected, malicious attacks can be defended, and system security can be protected.

Description

technical field [0001] The invention relates to a network security big data analysis technology. More specifically, the present invention relates to a method for detecting SQL injection attacks based on machine learning. Background technique [0002] In the current "5G" era, the network has long been integrated into people's daily lives, and the amount of cloud data is showing explosive growth. At the same time, everyone is surrounded by numbers, and network security has naturally become a hot topic. Every browser, app, and even the user used by the user will be stored in the database by major companies in the form of data. Whether it is an individual user or an enterprise, where there is data, there is a danger of being invaded. Criminals often use loopholes in programs to carry out network attacks, and the consequences of network attacks are usually very serious, such as stealing or abusing data information, causing server paralysis or even stealing money. In recent year...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55G06F16/2458G06F16/28G06F16/955G06K9/62G06N20/00
CPCG06F21/552G06F16/2465G06F16/284G06F16/955G06N20/00G06F2216/03G06F18/23G06F18/2411G06F18/214
Inventor 田新远
Owner 北京华清信安科技有限公司