iconOpen Access

ARTICLE

crossmark

An Improved LSTM-PCA Ensemble Classifier for SQL Injection and XSS Attack Detection

Deris Stiawan1, Ali Bardadi1, Nurul Afifah1, Lisa Melinda1, Ahmad Heryanto1, Tri Wanda Septian1, Mohd Yazid Idris2, Imam Much Ibnu Subroto3, Lukman4, Rahmat Budiarto5,*

1 Universitas Sriwijaya, Palembang, 30319, Indonesia
2 Universiti Teknologi Malaysia, Johor, 81310, Malaysia
3 Universitas Islam Sultan Agung, Semarang, 50112, Indonesia
4 Directorat General of Higher Education Research and Technology, Jakarta, 10270, Indonesia
5 Albaha University, Alaqiq, 65779-7738, Saudi Arabia

* Corresponding Author: Rahmat Budiarto. Email: email

Computer Systems Science and Engineering 2023, 46(2), 1759-1774. https://doi.org/10.32604/csse.2023.034047

Abstract

The Repository Mahasiswa (RAMA) is a national repository of research reports in the form of final assignments, student projects, theses, dissertations, and research reports of lecturers or researchers that have not yet been published in journals, conferences, or integrated books from the scientific repository of universities and research institutes in Indonesia. The increasing popularity of the RAMA Repository leads to security issues, including the two most widespread, vulnerable attacks i.e., Structured Query Language (SQL) injection and cross-site scripting (XSS) attacks. An attacker gaining access to data and performing unauthorized data modifications is extremely dangerous. This paper aims to provide an attack detection system for securing the repository portal from the abovementioned attacks. The proposed system combines a Long Short–Term Memory and Principal Component Analysis (LSTM-PCA) model as a classifier. This model can effectively solve the vanishing gradient problem caused by excessive positive samples. The experiment results show that the proposed system achieves an accuracy of 96.85% using an 80%:20% ratio of training data and testing data. The rationale for this best achievement is that the LSTM’s Forget Gate works very well as the PCA supplies only selected features that are significantly relevant to the attacks’ patterns. The Forget Gate in LSTM is responsible for deciding which information should be kept for computing the cell state and which one is not relevant and can be discarded. In addition, the LSTM’s Input Gate assists in finding out crucial information and stores specific relevant data in the memory.

Keywords


1  Introduction

SQL injection (SQLi) and cross-site scripting (XSS) are vulnerable attacks that exist in web applications [1,2]. Li et al. [3] include the SQLi attack among the top five web application security threads. It becomes increasingly dangerous when an attacker gains access to the data and performs unauthorized data modifications [4,5]. SQLi is performed by inserting SQL commands into web forms, domain names, or page queries and ultimately tricks the server into running malicious SQL commands, causing significant damage to websites and users [6]. XSS occurs when a malicious web code is sent, typically in the form of a script via a browser on the victim’s computer. Through XSS, attackers can retrieve personal information and steal user data. XSS has been listed several times among the Top 10 web application security risks in the Open Web Application Security Project, with 37.2% of occurrences, and is still king of the hill for high-risk issues [7]. On the other hand, the Open Web Application Security Project mentioned that SQL injections were the third most serious web application security risk in 2021, with 274,000 occurrences recorded. The SQLi and XSS payloads from the attack will be stored in the database, resulting in unstable PhpMyAdmin dashboard access because they contain all the payloads.

Since the year 2019, the Directorate General of Higher Education of the Ministry of Education of the Republic of Indonesia has developed three portals for disseminating outcomes of research in Indonesia. The first is the Science and Technology Index (SINTA) which measures the academicians’ and researchers’ performance; the second is the “Garba Rujukan Digital” (GARUDA) which collects all publications at any journals and publishers; and the third is the RAMA, which spreads and distributes research works carried out by undergraduate and postgraduate students in Indonesia [8]. The three portals (RAMA, SINTA, and GARUDA) have been integrated into a cloud network/system with several services and applications which complete each other. As the three portals are national assets, they are undoubtedly vulnerable to hacker attacks and cyber threats. Statistics of the portals’ visitors show an increasing trend yearly. The portal can also be accessed from different continents. Millions of visitors access the SINTA portal, while RAMA’s daily hits average more than 2000 visitors. Preliminary research showed that thousands of accesses were suspected of carrying out attempted attacks. Fig. 1 illustrates the complexity of the attack traffic captured from the RAMA-SINTA-GARUDA cloud network.

images

Figure 1: Real-time attack attempt traffic on the RAMA server

Previous studies have discussed the detection and prevention of SQLi via the classification of machine learning methods using a Support Vector Machine (SVM), producing an accuracy of 98% [810]. In the studies, the authors suggest that further research using other machine learning methods with multi-class data is required because previously employed methods used binary data in their studies. Another study has discussed SQLi detection using Multi-Layered Perceptron (MLP) and long short-term memory (LSTM) networks, both of which achieved 97% accuracy, with MLP having a bit higher accuracy compared to the LSTM [11]. The keyword recognition capabilities and special character detection using LSTM need improvement. The detection of unique characters, symbols, and numeric size differences remains unclear, which blurs the boundary between letters and characters in the LSTM detection process. Li et al. [3] discuss SQLi detection using the LSTM network and compare it with the MLP and K-Nearest Neighbors (KNN) method. The MLP and KNN methods achieved an accuracy level of 87% and 89%, respectively, and a vanishing gradient owing to an unbalanced spread of positive and negative data was observed. Meanwhile, the LSTM network produced the highest accuracy rate of 91%.

By referring to the research work carried out by Li et al. [3], this paper hypothesizes that the LSTM network can be used for SQLi and XSS attack detection on the RAMA Repository to solve the vanishing gradient problem. Thus, the main contribution of this paper is an ensemble of PCA feature selection with LSTM classifier for the development of SQLi and XSS attack detection systems. This paper also contributes towards identifying essential features that represent the appearance of the SQLi and XSS attack packets in network traffic.

2  Related Works

Li et al. [3] discussed an SQL injection detection system in intelligent transportation using LSTM networks, obtaining an accuracy of 91.79%. The experiment results showed that the sample positive generation method for data collection can reduce the problem of overfitting, which is beneficial for SQL injection detection. Xie et al. [6] researched SQL injection detection based on Elastic-Pooling Convolutional Neural Network (EP-CNN) using approximately 4.48 million real-time web log data. The study concluded that the introduction of SQL injection detection based on EP-CNN automatically extracts common hidden features in SQL injection and identifies attack traffic rapidly bypassing regular SQL injection. Zhou et al. [7] introduced a new model for detecting XSS based on the Bayesian network algorithm. The study proposed XSS attack detection based on ensemble learning approaches using domain knowledge and threat intelligence. This approach achieved an accuracy rate of 96.9%, which is better than the accuracy of several other algorithms, such as SVM, Random Forest, and Decision Tree.

Guo et al. [10] have researched the detection and prevention of SQL injection using the SVM algorithm in a 5G network. The SVM classifiers classify the packets into normal or malicious packets. The calculated throughput and intrusion detection rate are higher, while the latency, energy consumption, and packet loss rate are lower, indicating that the proposed approach has achieved better QoS. Alshunaifi et al. [11] used MLP and LSTM networks for SQL injection detection. The study concluded that LSTM has excellent potential in threat intelligence detection. A malicious Uniform Resource Locator (URL) detection was proposed by Tang et al. [12], obtaining an accuracy rate of 75%. Selvaganapathy et al. [13] discussed SQL injection detection using MLP and LSTM networks. The results showed that the extracted eigenvalues effectively detect SQL injection. This method can effectively avoid the gap caused by the filtering method. In a research work by Tang et al. [14], SQLi attack classification was carried out using a deep convolution neural network (CNN). XSS attack detection system using the decision tree algorithm with a detection accuracy of 93.70% was reported by Kascheev et al. [15]. The proposed system is superior to other algorithms, such as the Naïve Bayes classifier, SVM, and logistic regression. Akaishi et al. classified XSS attacks using machine learning with a frequency of appearance and co-occurrence [16]. In research work by Abaimov et al. [17], SQL injection and XSS detection system using code-injection detection with deep (CODDLE) was introduced. CODDLE is designed to support static methods and to analyze whether the query fully matches the existing tokens in the database with known instances. Then, numerical results are generated using the datasets that include SQL injection and XSS attacks. The results showed that CODDLE provided up to 94% accuracy. Meanwhile, Christy et al. [18] used deep learning to detect web attacks. Table 1 compares recent works on SQLi and XSS attack handling.

images

3  Material and Method

Fig. 2 illustrates the overall steps of the research methodology. The first step is preparing and cleaning SQL injection and XSS traffic datasets, followed by performing dynamic analysis, which includes: feature extraction on the attack traffic and normal traffic using the phpMyAdmin tool; and exporting the data from the .sql format to .csv format. After performing feature extraction, feature selection is done to obtain the best features for the classification process. Next, experiments on attack detection using LSTM, LSTM + PCA, Gated Recurrent Unit (GRU), and validation are carried out. The experiment results are then visualized.

images

Figure 2: Research methodology

3.1 Dataset and Its Preprocessing

This paper uses the SQLi and XSS datasets from the RAMA Repository. The Rama repository handles the information database storage through data harvesting from affiliations’ repositories via OAI XML. The dataset consists of the normal packets and two types of attack packets i.e., SQL injection and XSS. The labeling of attack data is done following the syntax structure of the attack packets. The total number of records in the dataset is 1,959,747, where 1,948,277 are normal packets, 11,074 are SQL injection attack packets, and 396 are XSS attack packets. However, this paper only considers 1,000,000 normal packets in the experiments. The distribution (in percentage) of the packets in the dataset is shown in Fig. 3. The dataset has been made publicly available at the Comnet Laboratory portal [19].

images

Figure 3: Distribution of the packets in the dataset

The dataset is in the form of .sql format, which will later be converted into a .csv file using MySQL tools. Preprocessing starts with first cleaning the data, followed by the label encoding process, which converts text data into numeric form. The last step in data preprocessing is data splitting, where the dataset is split into training data and testing data with four different ratios.

3.2 Dynamic Analysis of Attack Packets

During the analysis stage, the requested URL is assessed to detect a particular pattern from the record/data in a table field based on the specified string pattern and fill in the syntax/attack pattern in the value column [20].

This paper extracts the SQL tautology type from the attacker’s Internet Protocol (IP) address field. The attack payloads are listed in the corresponding requested_url column. Table 2 shows the SQL tautology types extracted from four attackers that exist in the RAMA-SINTA-GARUDA cloud network.

images

The attacker’s IP address 74.220.215.110 attempts an SQL injection attack via attack payloads randomly generated by the SQL_map automatic tool, and the payload uses the name_const parameter, wherein the parameter selects certain CHAR characters. The attacker’s IP address 103.56.189.55 selects the UNION operation on a specific ID number present in the search path website query parameters (/search/all/?q=), and the payload in URL-encoded, so that the browser can execute the injected SQL command.

The attacker’s IP address 140.213.32.67 performs an SQL injection attack with the option load_file and input URL of burp collaborator (aesdlur6qzajy489pn4texv2otunie659t0gq4f.burpcollaborator.net); the attacker will get a response from the target in the form of the server IP information and DNS IP server information. The attacker’s IP address 125.161.137.239 automates SQL injection attacks using the SQLmap tool by selecting the highest level and the highest risk option, which can be seen from the generated payload.

Table 3 shows the XSS payload of two attackers in the network. The attacker’s IP Address 140.213.32.67 inputs XSS payload in the HTML-script format; this script is known to trigger pop-up XSS alerts on specific browsers.

images

An attacker’s IP Address 202.67.43.1 tries to input XSS payload using the JavaScript code format, but the mod-security filter detected it on the target website; thus, the payload gets deleted. It can be seen from the removed string that the attacker intended to trigger a pop-up XSS alert on the browser. If the website has such the vulnerability, the attacker can change the payload and steal cookies from a specific target user.

3.3 Feature Extraction

The payload data (packet) structure consists of fields. The fields are considered as attributes and then as features of the packet. At this feature extraction stage, firstly, the .sql data is converted into .csv format. The features extraction process is performed using the XAMPP tool that connects to the phpMyAdmin localhost, where the .sql format file is exported to .csv format. The extracted features/attributes are displayed in Fig. 4.

images

Figure 4: Attributes of the dataset

3.4 PCA

A colossal dataset has high data dimensionality. To interpret efficiently a colossal dataset, this paper needs to reduce the dataset dimensionality while at the same time preserving the information in the dataset. Many approaches have been introduced for reducing the dimension of colossal datasets. The PCA is one of the most widely used approaches due to its efficiency in obtaining the relevant and significant features of the dataset [21]. Therefore, this paper chooses PCA as the data dimensionality reduction method. The PCA finds new variables i.e., the principal components, which are uncorrelated and ordered so that the first few retain most of the variation that exists in all of the original variables. Mathematically, the PCA attempts to solve an eigenvalue/eigenvector problem. The PCA equations are shown in (1) to (4).

a1=z11x1+z12x2++z1pxp=z1TX (1)

a2=z21x1+z22x2++z2pxp=z2TX (2)

ap=zp1x1+zp2x2++zppxp=zpTX (3)

a=[a1a2ap]=[z1TXz2TXzpTX]=[z1Tz2TzpT] X= ATX (4)

This paper considers the PCA method as an unsupervised learning mechanism with the following six steps:

1.    Consider the whole dataset with (p + 1) dimensions and disregard the labels, so the new dataset has p dimensional.

2.    For every dimension of the whole dataset, compute the mean value.

3.    For the whole dataset, compute its covariance matrix.

4.    Compute eigenvectors along with their corresponding eigenvalues.

5.    Arrange the eigenvectors, reduce the number of eigenvalues and choose corresponding k eigenvectors with the largest eigenvalues to form a (p × k) dimensional matrix A.

6.    Transform the sample matrix X onto the new subspace using the (p × k) eigenvector matrix.

3.5 Validation

To measure the effectiveness of the feature selection method discussed in Section 3.4, this paper performs a validation process using two classifier algorithms i.e., LSTM and GRU. Furthermore, this paper proposes an ensemble of PCA feature selection algorithm with an LSTM classifier algorithm and an ensemble of PCA feature selection algorithm with a GRU classifier algorithm, described in the following sub-sections. The condition of the dataset that is less varied causes a vanishing gradient condition. The Recurrent Neural Network (RNN), LSTM, and GRU methods are solutions that can solve the problem [22,23].

3.5.1 LSTM Network

Compared with recurrent neural networks (RNNs), LSTM networks can learn long-term dependencies more efficiently [20]. In LSTM networks, each traditional node in the hidden layer is replaced with a memory cell. This learning capability is the primary difference from standard RNNs [22]. The memory cell is the most essential structure that overcomes the shortcomings of ordinary RNNs in the learning process. LSTM networks can effectively solve the problem of the vanishing gradient caused by excessive positive samples. The proposed LSTM-PCA architecture is shown in Fig. 5. It can be seen that instead of using the original dataset, the reduced-dimensional dataset obtained by PCA as a feature selection algorithm is inputted into the LSTM engine.

images

Figure 5: Proposed architecture

The memory cell comprises four main elements i.e., a neuron with a self-recurrent connection, an input gate, forget gate, and an output gate [22,24]. The Input Gate of the LSTM updates the cell state and decides which information is important and which is not. The Forget Gate in LSTM is responsible for deciding which information should be kept for computing the cell state and which one is not relevant and can be discarded. The output gate determines the value of the next hidden state. The calculations for each LSTM update are shown in (5)(8).

Ct=ftθCt1+itθgt (5)

f(t)=σ(Wfxxt+Wfhht1+bf ) (6)

i(t)=σ(Wixxt+Wixht1+bi ) (7)

g(t)=tanh(Wgxxt+Wghht1+bg ) (8)

where,

Ct : internal memory

Ct1: previous internal memory

f(t) : forget gate

i(t) : input gate

g(t) : hidden state candidate

Wfx : weight of forget gate x

xt : input for time step t

b : bias

tanh : activation function

σ  : sigmoid function

3.5.2 Gated Recurrent Unit (GRU)

This paper also proposes the use of GRU as a classifier engine. The GRU component consists of two gates: the reset and update gates. The GRU has no internal memory and does not have an output gate like the LSTM network [21]. The advantage of GRU is that it is computationally more straightforward and effective enough to avoid gradient vanishing problems [24]. The input and forget gates are combined as update gates, while reset gates are applied directly to the previous hidden state, so GRU has only two gates i.e., reset gate rt dan update gate zt . Eqs. (9)(12) represent the GRU model:

zt=σ(Wz . [ht1,  xt]) (9)

rt=σ(Wr . [ht1,  xt]) (10)

h(t)=(1u(t)ht1+u(t)h~(t)) (11)

h~(t)=tanh(W .[r(t) ht1]+Wxt) (12)

where,

W : weight

Wz : update gate weight

Wr : reset gate weight

u(t) : update gate

r(t) : reset gate

xt : input for time step t

h(t) : hidden candidate

h~(t) : hidden state candidate

ht1: previous hidden state

tanh : activation function

σ  : sigmoid function

The GRU is another standard solution to address the vanishing gradient problem in RNNs, which is identified as a significant shortcoming of RNNs. GRU can be viewed as a variation of the LSTM network but with a more straightforward structure. The standard GRU is shown in Fig. 6. Similar to LSTM-PCA, the GRU is also in an ensemble with the PCA.

images

Figure 6: Gated recurrent unit

3.6 Performance Evaluation

A confusion matrix is implemented to measure the performance of a system. The system selects a model with a minimal loss value. The best model is evaluated based on the testing data. Subsequently, the system calculates and measures the Accuracy, Precision, Recall, and F1 score at the end of the evaluation process. This paper employs a multiclass system with three output classes, namely 0, for normal traffic, 1, for SQLi attack traffic, and 2, for XSS attack traffic. The equations for calculating the Accuracy, Precision, Recall, and F1 score are determined by (13) to (16) [25].

Accuracy=TP+TNTP+TN+FP+FN  (13)

Precision=TP TP+FP  (14)

Recall=TPTP+FN (15)

F1 Score=2 × Precision × RecallPrecision+Recall (16)

where TP is the number of true positives, TN is the number of true negatives, FP is the number of false positives, and FN is the number of false negatives.

4  Result and Discussion

4.1 Experiment Set up

Hardware and software specifications for the experiments are shown in Tables 4 and 5, respectively.

images

images

The PCA for feature selection is implemented in Python’s Scikit-Learn library. The first step is normalizing the data which is followed by data splitting for training and testing. This paper needs only three lines of code to perform PCA using Python’s Scikit-Learn library. The experiments are repeated five times for each dataset ratio and the average is taken as the final result. The selected features are then used by the LSTM model to classify the attack data traffic. For comparison, this paper also implemented the GRU model as a classifier.

4.2 Experimental Results

In this section, the results of experiments on the validation of the proposed system performances are highlighted. Firstly, the results of the confusion matrix are depicted in Fig. 7.

images

Figure 7: Confusion matrix

The confusion matrix in Fig. 7 represents the best experiment result. It is achieved when the 80%:20% ratio of the training dataset and the testing dataset is used. Tiny false negative (FN) values of 553 for normal data, 3554 for SQL injection, and 1022 for XSS were obtained. A minor FN value indicates that the proposed model is successful in classification.

Table 6 shows that LSTM–PCA is the best model classifier with an Accuracy of 0.9685 and Precision, F1 score, and Recall of 0.9700. The LSTM network has a more reliable performance than the GRU. However, GRU executes the training process faster compared to LSTM. Meanwhile, LSTM–PCA produces the best performance in terms of the vanishing gradient problem. Moreover, PCA can speed up the training process, completing it in 4800 s while maintaining the accuracy level and Precision–Recall curves as shown in Figs. 8 and 9, respectively.

images

images

Figure 8: Precision-recall

images

Figure 9: Precision-recall for multi-class

Fig. 9 shows the micro-average, which represents the average of the overall Precision–Recall curve and is represented by the yellow line. The blue, green, and orange lines in Fig. 9 show the average results of Precision–Recall for classes 0, 1, and 2, respectively. It is observed that the three graphs for class 0, class 1, and class 2 represent the best performance as the Precision–Recall curves show an ideal shape. The overall analysis concludes that the more data are trained, the better the Accuracy, Precision, Recall, and F1 score values.

4.3 Discussion

The LSTM method has been successfully applied with five trials and classification on SQL Injection & XSS attacks resulting in a good performance. The 50%:50% data ratio provides an accuracy of 96.35%, the 60%:40% data ratio provides an accuracy of 96.63%, the 70%:30% data ratio provides an accuracy of 91.2%, and the ratio of 80%:20% provides an accuracy of 96.85%. It is observed, in general, the more data training used, the more accuracy obtained.

The ensemble of the LSTM classifier and the PCA feature selection algorithm consistently always provides the best accuracy for any of the ratios of training data vs. testing data, as shown in Table 5. The best achievement was for the ratio of 80%:20% between training data and testing data. This result is also supported by its confusion matrix in Fig. 7. The Precision-Recall trend also supports the fact that the more significant ratio of the training data, the better accuracy obtained. This best achievement can be explained as follows. The LSTM’s Forget Gate works very well as the PCA supplies selected features that are significantly relevant to the attacks’ patterns. In addition, the Input Gate of the LSTM that updates the cell state and decides which information is essential or not also works better in assisting the Forget Gate in discarding unnecessary information and storing specific relevant data.

The effect of the split ratio was not significant; increasing the number of data in the training set from 40% to 70% conveyed only a tiny increase in the classification performance (Table 5). Since the detection was dedicated to multiclass classification, it is not surprising that the differences between the split ratios were not significant at small sample sizes (where the model performances were far from satisfactory anyway); however, the 70% and 80% split ratios performed better for the dataset. In these cases, the test sample was much smaller, but the performance of the models in test validations was not far from that in cross-validation.

As displayed in Fig. 3 of Section 3.1, the dataset for the experiment is imbalanced; only up to 11% of the total records are attack packets. In most circumstances, the evaluations of the performance show only up to 11% of the records presenting with features suggesting attack traffic will be finally identified as an attack, and up to 89% are not identified as attack traffic. The Precision-Recall curve is used for evaluating the performance of the proposed ensemble LSTM-PCA classifier. Predictive performance influences the Area Under the Precision-Recall Curve (AUC-PR). An ideal classifier does not make any prediction errors. Thus, it will obtain an AUC-PR of 1. The Precision-Recall curve in Fig. 9 provides a graphical representation of a classifier’s performance across many thresholds rather than a single value (e.g., Accuracy, F-1 score, etc.). The values of AUC-PR for class 0, class 1, and class 2, and overall, are more significant than 0.990. It means that the proposed ensemble LSTM-PCA classifier is a good classifier even if the dataset is imbalanced.

4.4 The Attacks Detection System Implementation

This section describes the attack detection system design and implementation. Fig. 10 shows the flowchart of the detection system. The entire payload will be analyzed dynamically using MySQL procedures to come up with extracted features. Then, the ensemble of PCA and LSTM is used as a classifier to detect whether the payload contains SQL injection or XSS attacks. If the classifier recognizes that the payload has attack features, the detection system will generate an alert.

images

Figure 10: Attacks detection system flowchart

5  Conclusion

This paper presented the implementation of an LSTM model for classifying SQL injection and XSS attacks in the RAMA Repository. The experiment results generally show that the LSTM model is easier to train and has a more reliable performance than GRU. The GRU training process is a little bit faster, but the sheer number of missed pieces of training makes the wasted time even more remarkable. This paper also implemented PCA as a data dimensionality reduction method to speed up the computational process of SQL injection and XSS classification. The proposed LSTM–PCA-based detection system exhibits outstanding performance with an accuracy of 96.85% when classifying SQL injection and XSS attacks. The proposed classifier can also handle an imbalanced dataset.

The authors plan to develop an automatic detection system for SQL injection and XSS attacks on the RAMA-SINTA-GARUDA cloud to be implemented as a Software Defined Network (SDN) in the future. The authors also consider the use of embedded feature selection methods that include interactions of features and at the same time maintaining reasonable computational cost.

Funding Statement: The authors received no specific funding for this study.

Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.

References

    1. G. E. Rodríguez, J. G. Torres, P. Flores and D. E. Benavides, “Cross-site scripting (XSS) attacks and mitigation: A survey,” Computer Networks, vol. 166, pp. 106960, 2020. [Google Scholar]

    2. H. Chen, J. Chen, J. Chen, S. Yin, Y. Wu et al., “An automatic vulnerability scanner for web applications,” in Proc. IEEE 19th Int. Conf. on Trust, Security and Privacy in Computing and Communications (TrustCom), Guangzhou, China, pp. 1519–1524, 2020. [Google Scholar]

    3. Q. Li, F. Wang, J. Wang and W. Li, “LSTM-based SQL injection detection method for intelligent transportation system,” IEEE Transactions on Vehicular Technology, vol. 68, no. 5, pp. 4182–4191, 2019. [Google Scholar]

    4. M. S. Aliero, K. N. Qureshi, M. F. Pasha, I. Ghani and R. A. Yauri, “Systematic review analysis on sqlia detection and prevention approaches,” Wireless Personal Communications, vol. 112, no. 4, pp. 2297–2333, 2020. [Google Scholar]

    5. L. Zhang, D. Zhang, C. Wang, J. Zhao and Z. Zhang, “ART4SQLi: The ART of SQL injection vulnerability discovery,” IEEE Transaction on Reliability, vol. 68, no. 4, pp. 1470–1489, 2019. [Google Scholar]

    6. X. Xie, C. Ren, Y. Fu, J. Xu and J. Guo, “SQL injection detection for web applications based on elastic-pooling CNN,” IEEE Access, vol. 7, pp. 151475–151481, 2019. [Google Scholar]

    7. Y. Zhou and P. Wang, “An ensemble learning approach for XSS attack detection with domain knowledge and threat intelligence,” Computers & Security, vol. 82, pp. 261–269, 2019. [Google Scholar]

    8. Kemendikbud, “RAMA Repository,” [Online]. Available: https://rama.kemdikbud.go.id/. [Google Scholar]

    9. J. Mathew, C. K. Pang, M. Luo and W. H. Leong, “Classification of imbalanced data by oversampling in kernel space of support vector machines,” IEEE Transaction on Neural Networks and Learning Systems, vol. 29, no. 9, pp. 4065–4076, 2018. [Google Scholar]

  10. S. Guo, Y. Liu, R. Chen, X. Sun and X. Wang, “Improved SMOTE algorithm to deal with imbalanced activity classes in smart homes,” Neural Processing Letters, vol. 50, no. 2, pp. 1503–1526, 2019. [Google Scholar]

  11. S. Y. Alshunaifi, S. Mishra and M. Alshehri, “Cyber-attack detection and mitigation using SVM for 5G network,” Intelligent Automation & Soft Computing, vol. 31, no. 1, pp. 13–28, 2022. [Google Scholar]

  12. P. Tang, W. Qiu, Z. Huang, H. Lian and G. Liu, “Detection of SQL injection based on artificial neural network,” Knowledge-Based Systems, vol. 190, pp. 105528, 2020. [Google Scholar]

  13. S. G. Selvaganapathy, M. Nivaashini and H. P. Natarajan, “Deep belief network based detection and categorization of malicious URLs,” Information Security Journal, vol. 27, no. 3, pp. 145–161, 2018. [Google Scholar]

  14. P. Tang, W. Qiu, Z. Huang, H. Lian and G. Liu, “SQL injection behavior mining based deep learning,” In: G. Gan et al., (Ed.ADMA 2018, Lecture Note on Artificial Intelligence, Cham, New York, USA: Springer, vol. 11323, pp. 445–454, 2018. [Google Scholar]

  15. S. Kascheev and T. Olenchikova, “The detecting cross-site scripting (XSS) using machine learning methods,” in Proc. GloSIC, Chelyabinsk, Russia, pp. 265–270, 2020. [Google Scholar]

  16. S. Akaishi and R. Uda, “Classification of XSS attacks by machine learning with frequency of appearance and co-occurrence,” in Proc. 53rd CISS, Baltimore, MD, USA, pp. 1–6, 2019. [Google Scholar]

  17. S. Abaimov and G. Bianchi, “CODDLE: Code-injection detection with deep learning,” IEEE Access, vol. 7, pp. 128617–128627, 2019. [Google Scholar]

  18. J. I. Christy Eunaicy and S. Suguna, “Web attack detection using deep learning models,” Materialstoday: Proceedings, vol. 62, pp. 4806–4813, 2022. [Google Scholar]

  19. Comnets, “COMNETS lab dataset,” [Online]. Available: https://github.com/comnetslabunsri/datasets. [Google Scholar]

  20. A. Ghafarian, “A hybrid method for detection and prevention of SQL injection attacks,” in Proc. 2017 Computing Conf., London, United Kingdom, pp. 833–838, 2017. [Google Scholar]

  21. M. Mateen, J. Wen, Nasrullah, S. Song and Z. Huang, “Fundus image classification using VGG-19 architecture with PCA and SVD,” Symmetry (Basel), vol. 11, no. 1, pp. 1–12, 2019. [Google Scholar]

  22. A. Sherstinsky, “Fundamentals of recurrent neural network (RNN) and long short-term memory (LSTM) network,” Physica D: Nonlinear Phenomena, vol. 404, pp. 132306, 2020. [Google Scholar]

  23. X. Wang, J. Xu, W. Shi and J. Liu, “OGRU: An optimized gated recurrent unit neural network,” Journal of Physic Conference Series, vol. 1325, no. 1, 2019. https://doi.org/10.1088/1742-6596/1325/1/012089. [Google Scholar]

  24. Ö. Yildirim, “A novel wavelet sequences based on deep bidirectional LSTM network model for ECG signal classification,” Computers in Biology and Medicine, vol. 96, pp. 189–202, 2018. [Google Scholar]

  25. A. Rácz, D. Bajusz and K. Héberger, “Effect of dataset size and train/test split ratios in QSAR/QSPR multiclass classification,” Molecules, vol. 26, no. 4, pp. 1–16. 2021. [Google Scholar]


Cite This Article

APA Style
Stiawan, D., Bardadi, A., Afifah, N., Melinda, L., Heryanto, A. et al. (2023). An improved LSTM-PCA ensemble classifier for SQL injection and XSS attack detection. Computer Systems Science and Engineering, 46(2), 1759-1774. https://doi.org/10.32604/csse.2023.034047
Vancouver Style
Stiawan D, Bardadi A, Afifah N, Melinda L, Heryanto A, Septian TW, et al. An improved LSTM-PCA ensemble classifier for SQL injection and XSS attack detection. Comput Syst Sci Eng. 2023;46(2):1759-1774 https://doi.org/10.32604/csse.2023.034047
IEEE Style
D. Stiawan et al., “An Improved LSTM-PCA Ensemble Classifier for SQL Injection and XSS Attack Detection,” Comput. Syst. Sci. Eng., vol. 46, no. 2, pp. 1759-1774, 2023. https://doi.org/10.32604/csse.2023.034047


cc Copyright © 2023 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1523

    View

  • 750

    Download

  • 0

    Like

Share Link