Full text

Turn on search term navigation

© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.

Abstract

Since SQL injection allows attackers to interact with the database of applications, it is regarded as a significant security problem. By applying machine learning algorithms, SQL injection attacks can be identified. Problem: In the training stage of machine learning methods, effective features are used to develop an optimal classifier that is highly accurate. The specification of the features with the highest efficacy is considered to be an NP-complete combinatorial optimization challenge. Selecting the most effective features refers to the procedure of identifying the smallest and most effective features in the dataset. The rationale behind this paper is to optimize the accuracy, precision, and sensitivity parameters of the SQL injection attack detection method. Method: In this paper, a method for identifying SQL injection attacks was suggested. In the first step, a particular training dataset that included 13 features was developed. In the second step, to specify the best features of the dataset, a specific binary variety of the Olympiad optimization algorithm was developed. Various machine learning algorithms were used to create the optimal attack detector. Results: Based on the experiments carried out, the suggested SQL injection detector using an artificial neural network and the feature selector can achieve 99.35% accuracy, 100% precision, and 100% sensitivity. Owing to selecting about 30% of the effective features, the proposed method enhanced the efficacy of SQL injection detectors.

Details

Title
Effective SQL Injection Detection: A Fusion of Binary Olympiad Optimizer and Classification Algorithm
Author
Arasteh, Bahman 1 ; Bouyer, Asgarali 2 ; Seyed Salar Sefati 3   VIAFID ORCID Logo  ; Craciunescu, Razvan 4   VIAFID ORCID Logo 

 Department of Software Engineering, Faculty of Engineering and Natural Science, Istinye University, Istanbul 34460, Turkey[email protected] (S.S.S.); Department of Computer Science, Khazar University, Baku AZ1096, Azerbaijan 
 Department of Software Engineering, Faculty of Engineering and Natural Science, Istinye University, Istanbul 34460, Turkey[email protected] (S.S.S.); Faculty of Computer Engineering, Azarbaijan Shahid Madani University, Tabriz 5375171379, Iran 
 Department of Software Engineering, Faculty of Engineering and Natural Science, Istinye University, Istanbul 34460, Turkey[email protected] (S.S.S.); Faculty of Electronics, Telecommunications and Information Technology, National University for Science and Technology Politehnica Bucharest, 060042 Bucharest, Romania; [email protected] 
 Faculty of Electronics, Telecommunications and Information Technology, National University for Science and Technology Politehnica Bucharest, 060042 Bucharest, Romania; [email protected] 
First page
2917
Publication year
2024
Publication date
2024
Publisher
MDPI AG
e-ISSN
22277390
Source type
Scholarly Journal
Language of publication
English
ProQuest document ID
3110582455
Copyright
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.