Effect of Deep Recurrent Architectures on Code Vulnerability Detection: Performance Evaluation for SQL Injection in Python

Uloženo v:
Podrobná bibliografie
Název: Effect of Deep Recurrent Architectures on Code Vulnerability Detection: Performance Evaluation for SQL Injection in Python
Autoři: Asta Slotkienė, Adomas Poška, Pavel Stefanovič, Simona Ramanauskaitė
Zdroj: Electronics ; Volume 14 ; Issue 17 ; Pages: 3436
Informace o vydavateli: Multidisciplinary Digital Publishing Institute
Rok vydání: 2025
Sbírka: MDPI Open Access Publishing
Témata: SQL injection vulnerabilities, Python code, deep recurrent architectures
Popis: Security defects in software code can lead to situations that compromise web-based systems, data security, service availability, and the reliability of functionality. Therefore, it is crucial to detect code vulnerabilities as early as possible. During the research, the architectures of the deep learning models, peephole LSTM, GRU-Z, and GRU-LN, their element regularizations, and their hyperparameter settings were analysed to achieve the highest performance in detecting SQL injection vulnerabilities in Python code. The results of the research showed that after investigating the effect of hyperparameters on Word2Vector embeddings and applying the most efficient one, the peephole LSTM, delivered the highest performance (F1 = 0.90)—surpassing GRU-Z (0.88) and GRU-LN (0.878)—thereby confirming that the access of the peephole connections to the cell state produces the highest performance score in the architecture of the peephole LSTM model. Comparison of the results with other research indicates that the use of the selected deep learning models and the suggested research methodology allows for improving the performance in detecting SQL injection vulnerabilities in Python-based web applications, with an F1 score reaching 0.90, which is approximately 10% higher than achieved by other researchers.
Druh dokumentu: text
Popis souboru: application/pdf
Jazyk: English
Relation: Computer Science & Engineering; https://dx.doi.org/10.3390/electronics14173436
DOI: 10.3390/electronics14173436
Dostupnost: https://doi.org/10.3390/electronics14173436
Rights: https://creativecommons.org/licenses/by/4.0/
Přístupové číslo: edsbas.DC55DC79
Databáze: BASE
Popis
Abstrakt:Security defects in software code can lead to situations that compromise web-based systems, data security, service availability, and the reliability of functionality. Therefore, it is crucial to detect code vulnerabilities as early as possible. During the research, the architectures of the deep learning models, peephole LSTM, GRU-Z, and GRU-LN, their element regularizations, and their hyperparameter settings were analysed to achieve the highest performance in detecting SQL injection vulnerabilities in Python code. The results of the research showed that after investigating the effect of hyperparameters on Word2Vector embeddings and applying the most efficient one, the peephole LSTM, delivered the highest performance (F1 = 0.90)—surpassing GRU-Z (0.88) and GRU-LN (0.878)—thereby confirming that the access of the peephole connections to the cell state produces the highest performance score in the architecture of the peephole LSTM model. Comparison of the results with other research indicates that the use of the selected deep learning models and the suggested research methodology allows for improving the performance in detecting SQL injection vulnerabilities in Python-based web applications, with an F1 score reaching 0.90, which is approximately 10% higher than achieved by other researchers.
DOI:10.3390/electronics14173436