Skip to main content

Real-Time Analysis of Non-stationary and Complex Network Related Data for Injection Attempts Detection

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 223))

Abstract

The growing use of cloud services, increased number of users, novel mobile operating systems and changes in network infrastructures that connect devices create novel challenges for cyber security. In order to counter arising threats, network security mechanisms and protection schemes also evolve and use sophisticated sensors and methods. The drawback is that the more sensors (probes) are applied and the more information they acquire, the volume of data to process grows significantly. In this paper, we present real-time network data analysis mechanism. We also show the results for SQL Injection Attacks detection.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. CERT Polska Annual Report. http://www.cert.pl/PDF/Report_CP_2011.pdf (2011)

  2. SOPHOS homepage http://www.sophos.com

  3. Cisco Annual Report (2011)

    Google Scholar 

  4. OWASP Top 10 2010, The Ten Most Critical Web Application Security Risks (2010)

    Google Scholar 

  5. Royal Navy Website Attacked by Romanian Hacker. http://www.bbc.co.uk/news/technology-11711478 (2008)

  6. Mills, E.: DSL Reports Says Member Information Stolen (2011)

    Google Scholar 

  7. Keizer, G.: Huge Web Hack Attack Infects 500,000 pages (2008)

    Google Scholar 

  8. Rao, T.K., Kum, G.Y., Reddy, E.K., Sharma, M.: Major issues of web applications: a case study of SQL injection. J. Curr. Comput. Sci. Technol. 2(1), 16–20 (2012)

    Google Scholar 

  9. Halfond, W., Orso, A.: AMNESIA: analysis and monitoring for neutralizing SQL-injection attacks. Proceedings of the 20th IEEEACM International Conference on Automated Software Engineering (2005)

    Google Scholar 

  10. Tajpour, A., JorJor Zade Shooshtari, M.: Evaluation of SQL injection detection and prevention techniques. In: CICSyN 2010 Second International Conference on Computational Intelligence, Communication Systems and, Networks (2010)

    Google Scholar 

  11. Amirtahmasebi, K., Jalalinia, S.R., Khadem, S.: A survey of SQL injection defense mechanisms. In: ICITST International Conference for Internet Technology and Secured, Transactions (2009)

    Google Scholar 

  12. Elia, I.A., Fonseca, J., Vieira, M.: Comparing SQL injection detection tools using attack injection: an experimental study. In: 2010 IEEE 21st International Symposium on Software, Reliability Engineering (2010)

    Google Scholar 

  13. Kruegel, C., Toth, T., Kirda, E.: Service specific anomaly detection for network intrusion detection. In: Proceedings of ACM Symposium on Applied, Computing, pp. 201–208 (2002)

    Google Scholar 

  14. Choraś, M., Kozik, R., Puchalski, D., Holubowicz, W.: Correlation approach for SQL injection attacks detection. In: Herrero, A. et al. (eds.) Advances in Intelligent Systems and Computing, vol. 189, pp. 177–186. Springer, Heidelberg (2012)

    Google Scholar 

  15. Needleman, S.B., Wunsch, C.D.: A general method applicable to the search for similarities in the amino acid sequence of two proteins. J. Mol. Biol. (1970)

    Google Scholar 

  16. Conrad, E.: Detecting Spam with Genetic Regular Expressions. SANS Institute InfoSec Reading Room (2007)

    Google Scholar 

Download references

Acknowledgments

This work was partially supported by Applied Research Programme (PBS) of the National Centre for Research and Development (NCBR) funds allocated for the Research Project number PBS1/A3/14/2012 (SECOR)).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Michał Choraś .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Choraś, M., Kozik, R. (2014). Real-Time Analysis of Non-stationary and Complex Network Related Data for Injection Attempts Detection. In: Snášel, V., Krömer, P., Köppen, M., Schaefer, G. (eds) Soft Computing in Industrial Applications. Advances in Intelligent Systems and Computing, vol 223. Springer, Cham. https://doi.org/10.1007/978-3-319-00930-8_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-00930-8_23

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-00929-2

  • Online ISBN: 978-3-319-00930-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics