SQLiGoT: Detecting SQL injection attacks using graph of tokens and SVM

SQL injection attacks have been predominant on web databases since the last 15 years. Exploiting input validation flaws, attackers inject SQL code through the front-end of websites and steal data from the back-end databases. Detection of SQL injection attacks has been a challenging problem due to ex...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:Computers & security Ročník 60; s. 206 - 225
Hlavní autori: Kar, Debabrata, Panigrahi, Suvasini, Sundararajan, Srikanth
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: Amsterdam Elsevier Ltd 01.07.2016
Elsevier Sequoia S.A
Predmet:
ISSN:0167-4048, 1872-6208
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract SQL injection attacks have been predominant on web databases since the last 15 years. Exploiting input validation flaws, attackers inject SQL code through the front-end of websites and steal data from the back-end databases. Detection of SQL injection attacks has been a challenging problem due to extreme heterogeneity of the attack vectors. In this paper, we present a novel approach to detect injection attacks by modeling SQL queries as graph of tokens and using the centrality measure of nodes to train a Support Vector Machine (SVM). We explore different methods of creating token graphs and propose alternative designs of the system comprising of single and multiple SVMs. The system is designed to work at the database firewall layer and can protect multiple web applications in a shared hosting scenario. Though we focus primarily on web applications developed with PHP and MySQL, the approach can be easily ported to other platforms. The experimental results demonstrate that this technique can effectively identify malicious SQL queries with negligible performance overhead.
AbstractList SQL injection attacks have been predominant on web databases since the last 15 years. Exploiting input validation flaws, attackers inject SQL code through the front-end of websites and steal data from the back-end databases. Detection of SQL injection attacks has been a challenging problem due to extreme heterogeneity of the attack vectors. In this paper, we present a novel approach to detect injection attacks by modeling SQL queries as graph of tokens and using the centrality measure of nodes to train a Support Vector Machine (SVM). We explore different methods of creating token graphs and propose alternative designs of the system comprising of single and multiple SVMs. The system is designed to work at the database firewall layer and can protect multiple web applications in a shared hosting scenario. Though we focus primarily on web applications developed with PHP and MySQL, the approach can be easily ported to other platforms. The experimental results demonstrate that this technique can effectively identify malicious SQL queries with negligible performance overhead.
Author Kar, Debabrata
Panigrahi, Suvasini
Sundararajan, Srikanth
Author_xml – sequence: 1
  givenname: Debabrata
  orcidid: 0000-0003-4177-9527
  surname: Kar
  fullname: Kar, Debabrata
  email: debabrata.kar@silicon.ac.in
  organization: Department of Computer Science and Engineering, Silicon Institute of Technology, Bhubaneswar, India
– sequence: 2
  givenname: Suvasini
  surname: Panigrahi
  fullname: Panigrahi, Suvasini
  organization: Department of Computer Science & Engineering & IT, VSS University of Technology, Burla, Sambalpur, India
– sequence: 3
  givenname: Srikanth
  surname: Sundararajan
  fullname: Sundararajan, Srikanth
  organization: Indian Institute of Technology, Bhubaneswar, India
BookMark eNp9kMtOxCAUhokZE8fLC7giceOmFVraUuPGjNdkjDGjbgmlp0qtMAI18e2lGVcuhg2X838nh28fzYw1gNAxJSkltDzrU2U9pFk8p4SlhBQ7aE55lSVlRvgMzWOhShhhfA_te98TQquS8zm6WT0t9a19PsdXEEAFbd5wfMLa9NPNGixDkOrD49FPtTcn1-_YdjjYDzAeS9Pi1evDIdrt5ODh6G8_QC8318-Lu2T5eHu_uFwmKi9pSEpK8qxuGsUKKYFAkzMl6yproFFFS1UjoSVMloryjvAyLxrF49BK0o5R1sr8AJ1u-q6d_RrBB_GpvYJhkAbs6AXlWcHquiI8Rk_-RXs7OhOnE7Sq8zqr44opvkkpZ7130Amlg5w-HpzUg6BETIJFLybBYhIsCBNRcESzf-ja6U_pfrZDFxsIoqVvDU54pcEoaLWLwkVr9Tb8F6rblWw
CODEN CPSEDU
CitedBy_id crossref_primary_10_3390_fi15040133
crossref_primary_10_1038_s41598_024_74350_3
crossref_primary_10_1109_TR_2019_2925415
crossref_primary_10_1145_3332371
crossref_primary_10_4018_IJISP_2020040102
crossref_primary_10_1016_j_fraope_2023_100041
crossref_primary_10_1080_19393555_2021_1995537
crossref_primary_10_3390_app10103440
crossref_primary_10_1109_TII_2020_3038761
crossref_primary_10_3390_jcp2040039
crossref_primary_10_1016_j_jisa_2018_04_001
crossref_primary_10_1049_2024_5565950
crossref_primary_10_1109_TIFS_2025_3583234
crossref_primary_10_52589_BJCNIT_R5YYKXKA
crossref_primary_10_1109_ACCESS_2024_3438092
crossref_primary_10_1016_j_cose_2021_102218
crossref_primary_10_1186_s40537_022_00678_0
crossref_primary_10_1109_ACCESS_2021_3125785
crossref_primary_10_1109_TIFS_2024_3350911
crossref_primary_10_1109_ACCESS_2019_2947527
Cites_doi 10.1007/s10791-011-9172-x
10.1007/BF00994018
10.3233/JCS-2009-0321
10.1016/j.eswa.2014.02.041
10.1016/j.ins.2011.06.020
10.1016/j.socnet.2004.11.008
10.1145/1698750.1698754
10.1016/j.socnet.2005.11.005
10.1016/j.infsof.2008.08.002
10.1109/TDSC.2011.59
10.1016/0378-8733(78)90021-7
10.1016/j.cose.2011.12.013
ContentType Journal Article
Copyright 2016 Elsevier Ltd
Copyright Elsevier Sequoia S.A. Jul 2016
Copyright_xml – notice: 2016 Elsevier Ltd
– notice: Copyright Elsevier Sequoia S.A. Jul 2016
DBID AAYXX
CITATION
7SC
8FD
JQ2
K7.
L7M
L~C
L~D
DOI 10.1016/j.cose.2016.04.005
DatabaseName CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
ProQuest Criminal Justice (Alumni)
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
ProQuest Criminal Justice (Alumni)
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList ProQuest Criminal Justice (Alumni)
Computer and Information Systems Abstracts

DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1872-6208
EndPage 225
ExternalDocumentID 4079097281
10_1016_j_cose_2016_04_005
S0167404816300451
Genre Feature
GroupedDBID --K
--M
-~X
.DC
.~1
0R~
1B1
1RT
1~.
1~5
29F
4.4
457
4G.
5GY
5VS
7-5
71M
8P~
9JN
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AAXUO
AAYFN
ABBOA
ABFSI
ABMAC
ABXDB
ABYKQ
ACDAQ
ACGFO
ACGFS
ACNNM
ACRLP
ACZNC
ADBBV
ADEZE
ADHUB
ADJOM
ADMUD
AEBSH
AEKER
AENEX
AFFNX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
ASPBG
AVWKF
AXJTR
AZFZN
BKOJK
BKOMP
BLXMC
CS3
DU5
E.L
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-2
G-Q
GBLVA
GBOLZ
HLX
HLZ
HVGLF
HZ~
IHE
J1W
KOM
LG8
LG9
M41
MO0
MS~
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
PQQKQ
Q38
R2-
RIG
RNS
ROL
RPZ
RXW
SBC
SBM
SDF
SDG
SDP
SES
SEW
SPC
SPCBC
SSV
SSZ
T5K
TAE
TN5
TWZ
WH7
WUQ
XJE
XPP
XSW
YK3
ZMT
~G-
9DU
AATTM
AAXKI
AAYWO
AAYXX
ABJNI
ABWVN
ACLOT
ACRPL
ACVFH
ADCNI
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AGQPQ
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
CITATION
EFKBS
~HD
7SC
8FD
JQ2
K7.
L7M
L~C
L~D
ID FETCH-LOGICAL-c361t-610329bbc45aae0eb34ca972bebc5d1cbaed04a6c18f08635bc8404ca1f414da3
ISICitedReferencesCount 48
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000378438600013&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0167-4048
IngestDate Wed Oct 01 14:15:55 EDT 2025
Thu Nov 20 01:09:25 EST 2025
Tue Nov 18 21:05:09 EST 2025
Sat Nov 29 05:55:41 EST 2025
Fri Feb 23 02:33:37 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords SQL injection attack
Query token graph
Node centrality
Support vector machine
SQL injection detection
Database firewall
Graph of tokens
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c361t-610329bbc45aae0eb34ca972bebc5d1cbaed04a6c18f08635bc8404ca1f414da3
Notes SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 14
ObjectType-Article-1
ObjectType-Feature-2
content type line 23
ORCID 0000-0003-4177-9527
PQID 1793929999
PQPubID 46289
PageCount 20
ParticipantIDs proquest_miscellaneous_1825499708
proquest_journals_1793929999
crossref_citationtrail_10_1016_j_cose_2016_04_005
crossref_primary_10_1016_j_cose_2016_04_005
elsevier_sciencedirect_doi_10_1016_j_cose_2016_04_005
PublicationCentury 2000
PublicationDate July 2016
2016-07-00
20160701
PublicationDateYYYYMMDD 2016-07-01
PublicationDate_xml – month: 07
  year: 2016
  text: July 2016
PublicationDecade 2010
PublicationPlace Amsterdam
PublicationPlace_xml – name: Amsterdam
PublicationTitle Computers & security
PublicationYear 2016
Publisher Elsevier Ltd
Elsevier Sequoia S.A
Publisher_xml – name: Elsevier Ltd
– name: Elsevier Sequoia S.A
References Kar, Panigrahi, Sundararajan (bib0130) 2015
Shahriar, North, Chen (bib0245) 2013
Maor, Shulman (bib0185) 2004
Kim, Lee (bib0140) 2014; 41
Boyd, Keromytis (bib0060) 2004
Choi, Kim, Choi, Kim (bib0080) 2011
Schölkopf, Smola (bib0240) 2001
Borgatti, Everett (bib0055) 2006; 28
Gauci, Henrique (bib0105) 2014
Lupták (bib0170) 2011
Jovanovic, Kruegel, Kirda (bib0125) 2006
Dahse (bib0095) 2010
Moosa (bib0200) 2010; 64
Chang, Lin (bib0075) 2011; 2
TrustWave (bib0265) 2013
Makiou, Begriche, Serhrouchni (bib0180) 2014
Ruse, Sarkar, Basu (bib0220) 2010
Bisht, Sistla, Venkatakrishnan (bib0035) 2010
TrustWave (bib0270) 2015
Wang, Li (bib9000) 2012; 6
Halfond, Viegas, Orso (bib0115) 2006
Cortes, Vapnik (bib0085) 1995; 20
Thomas, Williams, Xie (bib0260) 2009; 51
Palshikar (bib0205) 2007
Wang, Li (bib0290) 2012
Bockermann, Apel, Meier (bib0045) 2009
Kozik, Choraś (bib0145) 2014
Vigna, Valeur, Balzarotti, Robertson, Kruegel, Kirda (bib0275) 2009; 17
Bisht, Hinrichs, Skrupsky, Bobrowicz, Venkatakrishnan (bib0025) 2010
Long, Gardner, Brown (bib0160) 2011; vol. 2
Vishwanathan, Schraudolph, Kondor, Borgwardt (bib0280) 2010; 11
Shin, Williams, Xie (bib0250) 2006
Borgatti (bib0050) 2005; 27
Freeman (bib0100) 1979; 1
Quartini, Rondini (bib0215) 2011
Schmitt, Schinzel (bib0225) 2012
Wang, Do, Lin (bib0285) 2005
Le, Stavrou, Kang (bib0150) 2012; 9
Wei, Muthuprasanna, Kothari (bib0300) 2006
Buehrer, Weide, Sivilotti (bib0065) 2005
Mihalcea, Radev (bib0195) 2011
Benedikt, Freire, Godefroid (bib0015) 2002
Halfond, Orso (bib0110) 2005
Cova, Balzarotti, Felmetsger, Vigna (bib0090) 2007
Liu, Yuan, Wijesekera, Stavrou (bib0155) 2009
Hsu, Chang, Lin (bib0120) 2003
Sun, Beznosov (bib0255) 2008
Kemalis, Tzouramanis (bib0135) 2008
Wassermann, Yu, Chander, Dhurjati, Inamura, Su (bib0295) 2008
Scholte, Robertson, Balzarotti, Kirda (bib0235) 2012
Zhang, Lin, Chen, Hwang, Huang, Hsu (bib0305) 2011
Alserhani, Akhlaq, Awan, Cullen (bib0010) 2011
Bertino, Kamra, Early (bib0020) 2007
Bisht, Madhusudan, Venkatakrishnan (bib0030) 2010; 13
Low, Lee, Teoh (bib0165) 2002
Maciejak, Lovet (bib0175) 2009
Scholte, Balzarotti, Kirda (bib0230) 2012; 31
Carettoni, Paola (bib0070) 2009
Blanco, Lioma (bib0040) 2012; 15
McClure, Kruger (bib0190) 2005
Pinzón, De Paz, Herrero, Corchado, Bajo, Corchado (bib0210) 2013; 231
Ruse (10.1016/j.cose.2016.04.005_bib0220) 2010
Borgatti (10.1016/j.cose.2016.04.005_bib0050) 2005; 27
McClure (10.1016/j.cose.2016.04.005_bib0190) 2005
Wei (10.1016/j.cose.2016.04.005_bib0300) 2006
Hsu (10.1016/j.cose.2016.04.005_bib0120)
Choi (10.1016/j.cose.2016.04.005_bib0080) 2011
Zhang (10.1016/j.cose.2016.04.005_bib0305) 2011
Schölkopf (10.1016/j.cose.2016.04.005_bib0240) 2001
Wassermann (10.1016/j.cose.2016.04.005_bib0295) 2008
Vishwanathan (10.1016/j.cose.2016.04.005_bib0280) 2010; 11
Kemalis (10.1016/j.cose.2016.04.005_bib0135) 2008
Dahse (10.1016/j.cose.2016.04.005_bib0095)
Jovanovic (10.1016/j.cose.2016.04.005_bib0125) 2006
TrustWave (10.1016/j.cose.2016.04.005_bib0270)
Low (10.1016/j.cose.2016.04.005_bib0165) 2002
Palshikar (10.1016/j.cose.2016.04.005_bib0205) 2007
Quartini (10.1016/j.cose.2016.04.005_bib0215)
Scholte (10.1016/j.cose.2016.04.005_bib0230) 2012; 31
Wang (10.1016/j.cose.2016.04.005_bib0285) 2005
Freeman (10.1016/j.cose.2016.04.005_bib0100) 1979; 1
Kozik (10.1016/j.cose.2016.04.005_bib0145) 2014
Shin (10.1016/j.cose.2016.04.005_bib0250) 2006
Mihalcea (10.1016/j.cose.2016.04.005_bib0195) 2011
Halfond (10.1016/j.cose.2016.04.005_bib0110) 2005
Alserhani (10.1016/j.cose.2016.04.005_bib0010) 2011
Bisht (10.1016/j.cose.2016.04.005_bib0025) 2010
Gauci (10.1016/j.cose.2016.04.005_bib0105)
Bockermann (10.1016/j.cose.2016.04.005_bib0045) 2009
Wang (10.1016/j.cose.2016.04.005_bib0290) 2012
Bisht (10.1016/j.cose.2016.04.005_bib0030) 2010; 13
Blanco (10.1016/j.cose.2016.04.005_bib0040) 2012; 15
Pinzón (10.1016/j.cose.2016.04.005_bib0210) 2013; 231
Cortes (10.1016/j.cose.2016.04.005_bib0085) 1995; 20
Kim (10.1016/j.cose.2016.04.005_bib0140) 2014; 41
Le (10.1016/j.cose.2016.04.005_bib0150) 2012; 9
Schmitt (10.1016/j.cose.2016.04.005_bib0225) 2012
Chang (10.1016/j.cose.2016.04.005_bib0075) 2011; 2
Thomas (10.1016/j.cose.2016.04.005_bib0260) 2009; 51
Wang (10.1016/j.cose.2016.04.005_bib9000) 2012; 6
Kar (10.1016/j.cose.2016.04.005_bib0130) 2015
Makiou (10.1016/j.cose.2016.04.005_bib0180) 2014
Bertino (10.1016/j.cose.2016.04.005_bib0020) 2007
Borgatti (10.1016/j.cose.2016.04.005_bib0055) 2006; 28
Buehrer (10.1016/j.cose.2016.04.005_bib0065) 2005
Carettoni (10.1016/j.cose.2016.04.005_bib0070)
Scholte (10.1016/j.cose.2016.04.005_bib0235) 2012
Shahriar (10.1016/j.cose.2016.04.005_bib0245) 2013
Moosa (10.1016/j.cose.2016.04.005_bib0200) 2010; 64
Maor (10.1016/j.cose.2016.04.005_bib0185)
Liu (10.1016/j.cose.2016.04.005_bib0155) 2009
Sun (10.1016/j.cose.2016.04.005_bib0255) 2008
Maciejak (10.1016/j.cose.2016.04.005_bib0175) 2009
TrustWave (10.1016/j.cose.2016.04.005_bib0265)
Bisht (10.1016/j.cose.2016.04.005_bib0035) 2010
Benedikt (10.1016/j.cose.2016.04.005_bib0015) 2002
Boyd (10.1016/j.cose.2016.04.005_bib0060) 2004
Vigna (10.1016/j.cose.2016.04.005_bib0275) 2009; 17
Long (10.1016/j.cose.2016.04.005_bib0160) 2011; vol. 2
Halfond (10.1016/j.cose.2016.04.005_bib0115) 2006
Cova (10.1016/j.cose.2016.04.005_bib0090) 2007
Lupták (10.1016/j.cose.2016.04.005_bib0170) 2011
References_xml – volume: 51
  start-page: 589
  year: 2009
  end-page: 598
  ident: bib0260
  article-title: On automated prepared statement generation to remove SQL injection vulnerabilities
  publication-title: Inf Softw Technol
– start-page: 257
  year: 2006
  end-page: 263
  ident: bib0125
  article-title: Pixy: a static analysis tool for detecting web application vulnerabilities
– start-page: 264
  year: 2012
  end-page: 274
  ident: bib0290
  article-title: SQL injection detection via program tracing and machine learning
  publication-title: Internet and distributed computing systems
– volume: 9
  start-page: 512
  year: 2012
  end-page: 525
  ident: bib0150
  article-title: Doubleguard: detecting intrusions in multitier web applications
  publication-title: IEEE Trans Dependable Secure Comput
– volume: vol. 2
  year: 2011
  ident: bib0160
  publication-title: Google hacking for penetration testers
– volume: 28
  start-page: 466
  year: 2006
  end-page: 484
  ident: bib0055
  article-title: A graph-theoretic perspective on centrality
  publication-title: Soc Networks
– volume: 31
  start-page: 344
  year: 2012
  end-page: 356
  ident: bib0230
  article-title: Have things changed now? An empirical study on input validation vulnerabilities in web applications
  publication-title: Comput Secur
– start-page: 106
  year: 2005
  end-page: 113
  ident: bib0065
  article-title: Using parse tree validation to prevent SQL injection attacks
  publication-title: Proceedings of the 5th international workshop on software engineering and middleware
– year: 2009
  ident: bib0070
  article-title: HTTP parameter pollution
– volume: 1
  start-page: 215
  year: 1979
  end-page: 239
  ident: bib0100
  article-title: Centrality in social networks conceptual clarification
  publication-title: Soc Networks
– volume: 27
  start-page: 55
  year: 2005
  end-page: 71
  ident: bib0050
  article-title: Centrality and network flow
  publication-title: Soc Networks
– start-page: 503
  year: 2007
  end-page: 510
  ident: bib0205
  article-title: Keyword extraction from a single document using centrality measures
  publication-title: Pattern recognition and machine intelligence
– volume: 41
  start-page: 5416
  year: 2014
  end-page: 5430
  ident: bib0140
  article-title: Data-mining based SQL injection attack detection using internal query trees
  publication-title: Expert Syst Appl
– start-page: 175
  year: 2011
  end-page: 182
  ident: bib0010
  article-title: Event-based Alert Correlation System to Detect SQLI Activities
– start-page: 79
  year: 2011
  end-page: 88
  ident: bib0170
  article-title: Bypassing web application firewalls
– year: 2011
  ident: bib0195
  article-title: Graph-based natural language processing and information retrieval
– volume: 20
  start-page: 273
  year: 1995
  end-page: 297
  ident: bib0085
  article-title: Support-vector networks
  publication-title: Mach Learn
– start-page: 272
  year: 2010
  end-page: 288
  ident: bib0035
  article-title: Automatically preparing safe SQL queries
  publication-title: Financial cryptography and data security
– start-page: 391
  year: 2014
  end-page: 398
  ident: bib0145
  article-title: Machine learning techniques for cyber attacks detection
  publication-title: Image processing and communications challenges 5
– year: 2015
  ident: bib0270
  article-title: Trustwave 2015 global security report
– start-page: 248
  year: 2011
  end-page: 251
  ident: bib0305
  article-title: TransSQL: a translation and validation-based solution for SQL-injection attacks
– year: 2013
  ident: bib0265
  article-title: Executive summary: trustwave 2013 global security report
– volume: 11
  start-page: 1201
  year: 2010
  end-page: 1242
  ident: bib0280
  article-title: Graph kernels
  publication-title: J Mach Learn Res
– year: 2014
  ident: bib0105
  article-title: WAFW00F identifies and fingerprints Web Application Firewall (WAF) products
– start-page: 35
  year: 2014
  end-page: 40
  ident: bib0180
  article-title: Improving web application firewalls to detect advanced sql injection attacks
– year: 2002
  ident: bib0015
  article-title: VeriWeb: Automatically Testing Dynamic Web Sites
– start-page: 233
  year: 2012
  end-page: 243
  ident: bib0235
  article-title: Preventing input validation vulnerabilities in web applications through automated type analysis
– start-page: 19
  year: 2005
  end-page: 30
  ident: bib0285
  article-title: Term graph model for text classification
  publication-title: Advanced data mining and applications
– start-page: 449
  year: 2007
  end-page: 458
  ident: bib0020
  article-title: Profiling Database Application to Detect SQL Injection Attacks
– volume: 15
  start-page: 54
  year: 2012
  end-page: 92
  ident: bib0040
  article-title: Graph-based term weighting for information retrieval
  publication-title: Inf Retrieval
– start-page: 377
  year: 2015
  end-page: 390
  ident: bib0130
  article-title: SQLiDDS: SQL injection detection using query transformation and document similarity
  publication-title: Distributed computing and internet technology
– start-page: 191
  year: 2006
  end-page: 198
  ident: bib0300
  article-title: Preventing SQL injection attacks in stored procedures
– start-page: 618
  year: 2011
  end-page: 621
  ident: bib0080
  article-title: Efficient Malicious Code Detection Using N-Gram Analysis and SVM
– year: 2010
  ident: bib0095
  article-title: Exploiting hard filtered SQL injections
– start-page: 63
  year: 2007
  end-page: 86
  ident: bib0090
  article-title: Swaddler: an approach for the anomaly-based detection of state violations in web applications
  publication-title: Recent advances in intrusion detection
– volume: 231
  start-page: 15
  year: 2013
  end-page: 31
  ident: bib0210
  article-title: idMAS-SQL: intrusion detection based on mas to detect and block sql injection through data mining
  publication-title: Inf Sci (Ny)
– volume: 13
  start-page: 14
  year: 2010
  ident: bib0030
  article-title: CANDID: dynamic candidate evaluations for automatic prevention of SQL injection attacks
  publication-title: ACM Trans Inf Syst Secur (TISSEC)
– start-page: 31
  year: 2010
  end-page: 37
  ident: bib0220
  article-title: Analysis & detection of SQL injection vulnerabilities via automatic test case generation of programs
– start-page: 2153
  year: 2008
  end-page: 2158
  ident: bib0135
  article-title: SQL-IDS: a specification-based approach for SQL-injection detection
  publication-title: Proceedings of the 2008 ACM symposium on applied computing
– volume: 2
  start-page: 27
  year: 2011
  ident: bib0075
  article-title: Libsvm: a library for support vector machines
  publication-title: ACM Trans Intell Syst Technol (TIST)
– start-page: 265
  year: 2002
  end-page: 267
  ident: bib0165
  article-title: DIDAFIT: Detecting intrusions in databases through fingerprinting transactions
– year: 2003
  ident: bib0120
  article-title: A practical guide to support vector classification
– start-page: 12
  year: 2006
  end-page: 23
  ident: bib0115
  article-title: A classification of SQL-injection attacks and countermeasures
– year: 2004
  ident: bib0185
  article-title: SQL injection signatures evasion (white paper)
– volume: 17
  start-page: 305
  year: 2009
  end-page: 329
  ident: bib0275
  article-title: Reducing errors in the anomaly-based detection of web-based attacks through the combined analysis of web requests and SQL queries
  publication-title: J Comput Secur
– start-page: 34
  year: 2012
  end-page: 40
  ident: bib0225
  article-title: WAFFle: fingerprinting filter rules of web application firewalls
– start-page: 292
  year: 2004
  end-page: 302
  ident: bib0060
  article-title: SQLrand: preventing SQL injection attacks
  publication-title: Applied cryptography and network security
– year: 2011
  ident: bib0215
  article-title: Blind SQL injection with regular expressions attack
– volume: 6
  start-page: 191
  year: 2012
  end-page: 196
  ident: bib9000
  article-title: SQL injection detection with composite kernel in support vector machine
  publication-title: Int. J. Sec. Appl
– start-page: 512
  year: 2013
  end-page: 517
  ident: bib0245
  article-title: Client-side detection of sql injection attack
  publication-title: Advanced information systems engineering workshops
– year: 2006
  ident: bib0250
  article-title: SQLUnitgen: Test case generation for SQL injection detection
– start-page: 2054
  year: 2009
  end-page: 2061
  ident: bib0155
  article-title: SQLProb: a proxy-based architecture towards preventing SQL injection attacks
  publication-title: Proceedings of the 2009 ACM symposium on applied computing
– volume: 64
  start-page: 12
  year: 2010
  end-page: 21
  ident: bib0200
  article-title: Artificial neural network based web application firewall for sql injection
  publication-title: World Acad Sci Eng Technol
– year: 2001
  ident: bib0240
  article-title: Learning with kernels: support vector machines, regularization, optimization, and beyond
– start-page: 174
  year: 2005
  end-page: 183
  ident: bib0110
  article-title: AMNESIA: Analysis and Monitoring for NEutralizing SQL-Injection Attacks
– start-page: 88
  year: 2005
  end-page: 96
  ident: bib0190
  article-title: SQL DOM: compile time checking of dynamic SQL statements
– start-page: 607
  year: 2010
  end-page: 618
  ident: bib0025
  article-title: NoTamper: Automatic Blackbox Detection of Parameter Tampering Opportunities in Web Applications
– start-page: 286
  year: 2009
  end-page: 288
  ident: bib0175
  article-title: Botnet-powered Sql injection attacks: a deeper look within
– start-page: 249
  year: 2008
  end-page: 260
  ident: bib0295
  article-title: Dynamic test input generation for web applications
  publication-title: Proceedings of the 2008 international symposium on software testing and analysis
– start-page: 196
  year: 2009
  end-page: 205
  ident: bib0045
  article-title: Learning SQL for database intrusion detection using context-sensitive modelling
  publication-title: Detection of intrusions and malware, and vulnerability assessment
– year: 2008
  ident: bib0255
  article-title: SQLPrevent: effective dynamic detection and prevention of SQL injection attacks without access to the application source code
– start-page: 272
  year: 2010
  ident: 10.1016/j.cose.2016.04.005_bib0035
  article-title: Automatically preparing safe SQL queries
– start-page: 12
  year: 2006
  ident: 10.1016/j.cose.2016.04.005_bib0115
– start-page: 257
  year: 2006
  ident: 10.1016/j.cose.2016.04.005_bib0125
– ident: 10.1016/j.cose.2016.04.005_bib0265
– start-page: 249
  year: 2008
  ident: 10.1016/j.cose.2016.04.005_bib0295
  article-title: Dynamic test input generation for web applications
– start-page: 2153
  year: 2008
  ident: 10.1016/j.cose.2016.04.005_bib0135
  article-title: SQL-IDS: a specification-based approach for SQL-injection detection
– volume: 15
  start-page: 54
  issue: 1
  year: 2012
  ident: 10.1016/j.cose.2016.04.005_bib0040
  article-title: Graph-based term weighting for information retrieval
  publication-title: Inf Retrieval
  doi: 10.1007/s10791-011-9172-x
– start-page: 618
  year: 2011
  ident: 10.1016/j.cose.2016.04.005_bib0080
– volume: 2
  start-page: 27
  issue: 3
  year: 2011
  ident: 10.1016/j.cose.2016.04.005_bib0075
  article-title: Libsvm: a library for support vector machines
  publication-title: ACM Trans Intell Syst Technol (TIST)
– start-page: 292
  year: 2004
  ident: 10.1016/j.cose.2016.04.005_bib0060
  article-title: SQLrand: preventing SQL injection attacks
– start-page: 233
  year: 2012
  ident: 10.1016/j.cose.2016.04.005_bib0235
– volume: 20
  start-page: 273
  issue: 3
  year: 1995
  ident: 10.1016/j.cose.2016.04.005_bib0085
  article-title: Support-vector networks
  publication-title: Mach Learn
  doi: 10.1007/BF00994018
– ident: 10.1016/j.cose.2016.04.005_bib0120
– start-page: 34
  year: 2012
  ident: 10.1016/j.cose.2016.04.005_bib0225
– start-page: 35
  year: 2014
  ident: 10.1016/j.cose.2016.04.005_bib0180
– start-page: 63
  year: 2007
  ident: 10.1016/j.cose.2016.04.005_bib0090
  article-title: Swaddler: an approach for the anomaly-based detection of state violations in web applications
– start-page: 79
  year: 2011
  ident: 10.1016/j.cose.2016.04.005_bib0170
– start-page: 377
  year: 2015
  ident: 10.1016/j.cose.2016.04.005_bib0130
  article-title: SQLiDDS: SQL injection detection using query transformation and document similarity
– start-page: 391
  year: 2014
  ident: 10.1016/j.cose.2016.04.005_bib0145
  article-title: Machine learning techniques for cyber attacks detection
– volume: 17
  start-page: 305
  issue: 3
  year: 2009
  ident: 10.1016/j.cose.2016.04.005_bib0275
  article-title: Reducing errors in the anomaly-based detection of web-based attacks through the combined analysis of web requests and SQL queries
  publication-title: J Comput Secur
  doi: 10.3233/JCS-2009-0321
– start-page: 265
  year: 2002
  ident: 10.1016/j.cose.2016.04.005_bib0165
– volume: vol. 2
  year: 2011
  ident: 10.1016/j.cose.2016.04.005_bib0160
– start-page: 607
  year: 2010
  ident: 10.1016/j.cose.2016.04.005_bib0025
– ident: 10.1016/j.cose.2016.04.005_bib0185
– start-page: 191
  year: 2006
  ident: 10.1016/j.cose.2016.04.005_bib0300
– volume: 41
  start-page: 5416
  issue: 11
  year: 2014
  ident: 10.1016/j.cose.2016.04.005_bib0140
  article-title: Data-mining based SQL injection attack detection using internal query trees
  publication-title: Expert Syst Appl
  doi: 10.1016/j.eswa.2014.02.041
– start-page: 512
  year: 2013
  ident: 10.1016/j.cose.2016.04.005_bib0245
  article-title: Client-side detection of sql injection attack
– volume: 231
  start-page: 15
  year: 2013
  ident: 10.1016/j.cose.2016.04.005_bib0210
  article-title: idMAS-SQL: intrusion detection based on mas to detect and block sql injection through data mining
  publication-title: Inf Sci (Ny)
  doi: 10.1016/j.ins.2011.06.020
– volume: 6
  start-page: 191
  issue: 2
  year: 2012
  ident: 10.1016/j.cose.2016.04.005_bib9000
  article-title: SQL injection detection with composite kernel in support vector machine
  publication-title: Int. J. Sec. Appl
– ident: 10.1016/j.cose.2016.04.005_bib0105
– year: 2001
  ident: 10.1016/j.cose.2016.04.005_bib0240
– volume: 27
  start-page: 55
  issue: 1
  year: 2005
  ident: 10.1016/j.cose.2016.04.005_bib0050
  article-title: Centrality and network flow
  publication-title: Soc Networks
  doi: 10.1016/j.socnet.2004.11.008
– year: 2006
  ident: 10.1016/j.cose.2016.04.005_bib0250
– ident: 10.1016/j.cose.2016.04.005_bib0070
– volume: 13
  start-page: 14
  issue: 2
  year: 2010
  ident: 10.1016/j.cose.2016.04.005_bib0030
  article-title: CANDID: dynamic candidate evaluations for automatic prevention of SQL injection attacks
  publication-title: ACM Trans Inf Syst Secur (TISSEC)
  doi: 10.1145/1698750.1698754
– volume: 64
  start-page: 12
  year: 2010
  ident: 10.1016/j.cose.2016.04.005_bib0200
  article-title: Artificial neural network based web application firewall for sql injection
  publication-title: World Acad Sci Eng Technol
– volume: 28
  start-page: 466
  issue: 4
  year: 2006
  ident: 10.1016/j.cose.2016.04.005_bib0055
  article-title: A graph-theoretic perspective on centrality
  publication-title: Soc Networks
  doi: 10.1016/j.socnet.2005.11.005
– volume: 51
  start-page: 589
  issue: 3
  year: 2009
  ident: 10.1016/j.cose.2016.04.005_bib0260
  article-title: On automated prepared statement generation to remove SQL injection vulnerabilities
  publication-title: Inf Softw Technol
  doi: 10.1016/j.infsof.2008.08.002
– start-page: 174
  year: 2005
  ident: 10.1016/j.cose.2016.04.005_bib0110
– start-page: 248
  year: 2011
  ident: 10.1016/j.cose.2016.04.005_bib0305
– ident: 10.1016/j.cose.2016.04.005_bib0215
– volume: 11
  start-page: 1201
  year: 2010
  ident: 10.1016/j.cose.2016.04.005_bib0280
  article-title: Graph kernels
  publication-title: J Mach Learn Res
– year: 2002
  ident: 10.1016/j.cose.2016.04.005_bib0015
– year: 2008
  ident: 10.1016/j.cose.2016.04.005_bib0255
– start-page: 2054
  year: 2009
  ident: 10.1016/j.cose.2016.04.005_bib0155
  article-title: SQLProb: a proxy-based architecture towards preventing SQL injection attacks
– start-page: 106
  year: 2005
  ident: 10.1016/j.cose.2016.04.005_bib0065
  article-title: Using parse tree validation to prevent SQL injection attacks
– year: 2011
  ident: 10.1016/j.cose.2016.04.005_bib0195
– start-page: 449
  year: 2007
  ident: 10.1016/j.cose.2016.04.005_bib0020
– start-page: 196
  year: 2009
  ident: 10.1016/j.cose.2016.04.005_bib0045
  article-title: Learning SQL for database intrusion detection using context-sensitive modelling
– ident: 10.1016/j.cose.2016.04.005_bib0270
– start-page: 88
  year: 2005
  ident: 10.1016/j.cose.2016.04.005_bib0190
– start-page: 19
  year: 2005
  ident: 10.1016/j.cose.2016.04.005_bib0285
  article-title: Term graph model for text classification
– volume: 9
  start-page: 512
  issue: 4
  year: 2012
  ident: 10.1016/j.cose.2016.04.005_bib0150
  article-title: Doubleguard: detecting intrusions in multitier web applications
  publication-title: IEEE Trans Dependable Secure Comput
  doi: 10.1109/TDSC.2011.59
– volume: 1
  start-page: 215
  issue: 3
  year: 1979
  ident: 10.1016/j.cose.2016.04.005_bib0100
  article-title: Centrality in social networks conceptual clarification
  publication-title: Soc Networks
  doi: 10.1016/0378-8733(78)90021-7
– start-page: 175
  year: 2011
  ident: 10.1016/j.cose.2016.04.005_bib0010
– start-page: 31
  year: 2010
  ident: 10.1016/j.cose.2016.04.005_bib0220
– volume: 31
  start-page: 344
  year: 2012
  ident: 10.1016/j.cose.2016.04.005_bib0230
  article-title: Have things changed now? An empirical study on input validation vulnerabilities in web applications
  publication-title: Comput Secur
  doi: 10.1016/j.cose.2011.12.013
– start-page: 503
  year: 2007
  ident: 10.1016/j.cose.2016.04.005_bib0205
  article-title: Keyword extraction from a single document using centrality measures
– start-page: 286
  year: 2009
  ident: 10.1016/j.cose.2016.04.005_bib0175
– ident: 10.1016/j.cose.2016.04.005_bib0095
– start-page: 264
  year: 2012
  ident: 10.1016/j.cose.2016.04.005_bib0290
  article-title: SQL injection detection via program tracing and machine learning
SSID ssj0017688
Score 2.340539
Snippet SQL injection attacks have been predominant on web databases since the last 15 years. Exploiting input validation flaws, attackers inject SQL code through the...
SourceID proquest
crossref
elsevier
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 206
SubjectTerms Applications programs
Codes
Cybersecurity
Database firewall
Graph of tokens
Graphs
Heterogeneity
Mathematical analysis
Node centrality
Queries
Query languages
Query token graph
Software
SQL injection attack
SQL injection detection
Structured Query Language-SQL
Studies
Support vector machine
Support vector machines
Title SQLiGoT: Detecting SQL injection attacks using graph of tokens and SVM
URI https://dx.doi.org/10.1016/j.cose.2016.04.005
https://www.proquest.com/docview/1793929999
https://www.proquest.com/docview/1825499708
Volume 60
WOSCitedRecordID wos000378438600013&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals 2021
  customDbUrl:
  eissn: 1872-6208
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0017688
  issn: 0167-4048
  databaseCode: AIEXJ
  dateStart: 19950101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1bb9owFLZYu4e97D6NrZs8aX1CqRKci7M3tMIuYqwVdOLNso2jhVYJhYD6S_Z7d3xJYJ2GtoeBFCEnNnDO52Ofi89B6C1RkQKNK_G6RCgvjEjq0TgSnspUBlqzgEXRVC0ZJqMRnU7Ts1brR30WZnOVFAW9uUkX_5XV0AbM1kdn_4HdzaDQAJ-B6XAFtsP1rxg_Ph_mH8qJVvVPlXYRmJzb58NOXsyVKwxeVfpofWdtDAUmZ7WJFSgvQam1wZzfvuxuW-vaDyuDlJWredcIaxukDaKLg-5dNYL-jBc5DG7KBoOE2nD4unzrhdImDHjPnQl2mV8Cl7_vmiGCuAlZdbax-nzMWF2vy5x3xie9XbOlzq7u25yaJ8qKWpp0vbjr011ZbGsL1MLU5CL4Xchbe8P8REf06-C82CSr9aPtkla78Udf2eBiOGST_nTy612zgoMym-r0RTQ4JoPFtadrkWmf_TE5tbi4gw67SZSCwD_sfepPPzf-KVDSaJM1Hv6XO45lIwdv_64_bXluLf5mRzN5iO47VQT3LIQeoZYqHqMHNauxk_pP0MAh6h1u8IShCTd4wg5P2OAJGzzhMsMWTxjwhAFPT9HFoD95_9Fz5Tc8SeKg8mKdazEVQoYR58pXgoSSA7WEEjKaBVJwNfNDHsuAZqAYk0hICrSQPMjCIJxx8gwdFGWhniOs5zyRPg9VNgv5LKFEQPeAqyz2Q0FIGwU1hZh0uel1iZQrVgchzpmmKtNUZX7IgKpt1Gn6LGxmlr1PRzXhmdtb2j0jA1Tt7XdUc4m5Sb5ielEDtQJebfSmuQ1yWTvbeKHKNTxjTS-JT1_sH-IluredT0fooFqu1St0V26qfLV87YD3E0zDrCo
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=SQLiGoT%3A+Detecting+SQL+injection+attacks+using+graph+of+tokens+and+SVM&rft.jtitle=Computers+%26+security&rft.au=Kar%2C+Debabrata&rft.au=Panigrahi%2C+Suvasini&rft.au=Sundararajan%2C+Srikanth&rft.date=2016-07-01&rft.pub=Elsevier+Sequoia+S.A&rft.issn=0167-4048&rft.eissn=1872-6208&rft.volume=60&rft.spage=206&rft_id=info:doi/10.1016%2Fj.cose.2016.04.005&rft.externalDBID=NO_FULL_TEXT&rft.externalDocID=4079097281
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0167-4048&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0167-4048&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0167-4048&client=summon