Browse > Article
http://dx.doi.org/10.13089/JKIISC.2020.30.3.455

Detection of NoSQL Injection Attack in Non-Relational Database Using Convolutional Neural Network and Recurrent Neural Network  

Seo, Jeong-eun (Korea University)
Moon, Jong-sub (Korea University)
Abstract
With a variety of data types and high utilization of data, non-relational databases are a popular data storage because it supports better availability and scalability. The increasing use of this technology also brings the risk of NoSQL injection attacks. Existing works mostly discuss the rule-based detection of NoSQL injection attacks that it is hard to deal with NoSQL queries beyond the coverage of the rules. In this paper, we propose a model for detecting NoSQL injection attacks. Our model is based on deep learning algorithms that select features from NoSQL queries using CNN, and classify NoSQL queries using RNN. Also, we experiment the proposed model to compare with existing models, and find that our model outperforms traditional models in terms of detection rate.
Keywords
NoSQL injection; Deep Learning; Convolutional Neural Network(CNN); Recurrent Neural Network(RNN);
Citations & Related Records
연도 인용수 순위
  • Reference
1 A. Ron, A. Shulman-Peleg, and E. Bronshtein, "No SQL, no injection?," Proceedings of the 36th IEEE Symposium on Web 2.0 Security and Privacy, May. 2015.
2 B. Hou, K. Qian, L. Li, Y. Shi, L. Tao, and J. Liu, "MongoDB NoSQL Injection Analysis and Detection," Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, pp. 75-78, Aug. 2016.
3 A. M. Eassa, O. H. Al-Tarawneh, and A. S. Salama, "Nosql racket: A testing tool for detecting nosql injection attacks in web applications," International Journal of Advanced Computer Science and Applications, 8(11), pp.614-622, Nov. 2017.
4 Wired Business Media, "Thousands of MongoDB Databases Found Exposed on the Internet," https://www.securityweek.com/thousands-Mongodb-databases-found-exposed-internet, 20200228
5 M. R. Ul Islam, M. S. Islam, Z. Ahmed, A. Iqbal, and R. Shahriyar, "Automatic Detection of NoSQL Injection Using Supervised Learning," Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, pp. 760-769, July. 2019.
6 Y. Bengio, A. Courville, and P. Vincent, "Representation Learning: A Review and New Perspectives," IEEE Transactions on Pattern Analysis and Machine Intelligence, 35(8), pp.1798-1828, Aug. 2013.   DOI
7 S. Albelwi and A. Mahmood, "A frame work for designing the architectures of deep convolutional neural networks," Entropy, 19(6), pp. 242-263, May. 2017.   DOI
8 F. A. Gers, J. Schmidhuber, and F. Cummins, "Learning to forget: continua l prediction with LSTM," Proceedings of the 9th International Conference on Artificial Neural Networks, pp. 850-855, Sep. 1999.
9 B. Shi, X. Bai, and C. Yao, "An endto-end trainable neural network for image-based sequence recognition and its application to scene text recognition," IEEE transactions on pattern analysis and machine intelligence, 39(11), pp. 2298-2304, Dec. 2016   DOI
10 X. Zhang, J. Zhao, and Y. LeCun, "Character-level convolutional networks for text classification," Advances in Neural Information Processing Systems 28, pp. 649-657, 2015.
11 B. Xu, N. Wang, T. Chen, and M. Li, "Empirical evaluation of rectified activations in convolutional network," arXiv preprint arXiv:1505.00853, 2015
12 D. P. Kingma and J. Ba, "Adam: A method for stochastic optimization," arXiv preprint arXiv:1412.6980, 2014.
13 NIST, "CVE-2018-1784 Detail," https://nvd.nist.gov/vuln/detail/CVE-2018-1784#vulnCurrentDescriptionTitle, 20200228
14 MongoDB, "mongodb all customers," https://www.Mongodb.com/who-uses-Mongodb, 20200302
15 CWE, "CWE VIEW: Weaknesses in the 2019 CWE Top 25 Most Dangerous Software Errors," https://cwe.mitre.org/data/definitions/1200.html, 20200302
16 OWASP, "OWASP Top10," https://owasp.org/www-project-top-ten/, 20200228
17 NIST, "CVE-2019-9039 Detail," https://nvd.nist.gov/vuln/detail/CVE-2019-9039, 20200228