Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

SQL injection attack detection method based on dynamic clone selection algorithm

A clone selection algorithm and injection attack technology, applied in the field of network security, can solve problems such as failure to identify unknown features, WAF detection performance degradation, etc.

Active Publication Date: 2019-08-30
南方电网互联网服务有限公司
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a SQL injection attack detection method based on a dynamic clone selection algorithm to solve the problems of the existing WAF detection performance degradation and the inability to identify unknown features and various deformation attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SQL injection attack detection method based on dynamic clone selection algorithm
  • SQL injection attack detection method based on dynamic clone selection algorithm
  • SQL injection attack detection method based on dynamic clone selection algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0055] SQL injection attack detection method based on dynamic clone selection algorithm, the process is as follows figure 1 shown, follow these steps:

[0056] Step S1: extract the SQL statement submitted by the client browser, submit the SQL statement to the rule base detection module for "SQLIAs" fast pattern matching, if the matching is successful, it indicates that the statement contains injection attack code, and the system termi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an SQL injection attack detection method based on a dynamic clonal selection algorithm. The method comprises the steps of extracting SQL statements submitted by a client browser and submitting the SQL statements to a rule base detection module for SQLIAs (SQL Injection Attacks) rapid mode matching; submitting the statements with unsuccessful mode matching to a dynamic detection module for deeper detection, introducing a local outlier factor as a fitness function for optimization of the distance between detectors before the dynamic detection module is operated, and constructing efficient detectors to identify normal data and abnormal data; operating the dynamic detection module to carry out detection; calling a clonal selection algorithm to carry out learning and identification; and updating system modules according to a detection result. The problem that the detection performance of an existing WAF (Web Application Firewall) is reduced and unknown features and various deformation attacks cannot be identified is solved.

Description

technical field [0001] The invention belongs to the technical field of network security, in particular to a SQL injection attack detection method based on a dynamic clone selection algorithm. Background technique [0002] Web security is one of the research hotspots in the field of information security. SQL injection attacks (SQLIAs, SQLinjection attacks) are a kind of web application attack. Ranked in the top three. [0003] At present, the main method to protect SQLIAs is to set up a Web Application Firewall (WAF). WAF is a detection mechanism based on abnormal rule base. With the continuous increase of various variant attacks, its rule base will become larger and larger, resulting in Its detection performance degrades, and more seriously, it fails to recognize unknown features and various deformation attacks. Based on this, it is necessary to invent a new dynamic SQL injection attack detection method to solve the above problems existing in the existing methods. SUMMAR...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/24
Inventor 兰方鹏张泽华
Owner 南方电网互联网服务有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products