Web Application Security through Gene Expression Programming

  • Authors:
  • Jaroslaw Skaruz;Franciszek Seredynski

  • Affiliations:
  • Institute of Computer Science, University of Podlasie, Siedlce, Poland 08-110;Polish-Japanese Institute of Information Technology, Warsaw, 02-008 and Institute of Computer Science, Polish Academy of Sciences, Warsaw, Poland 01-237

  • Venue:
  • EvoWorkshops '09 Proceedings of the EvoWorkshops 2009 on Applications of Evolutionary Computing: EvoCOMNET, EvoENVIRONMENT, EvoFIN, EvoGAMES, EvoHOT, EvoIASP, EvoINTERACTION, EvoMUSART, EvoNUM, EvoSTOC, EvoTRANSLOG
  • Year:
  • 2009

Quantified Score

Hi-index 0.01

Visualization

Abstract

In the paper we present a novel approach based on applying a modern metaheuristic Gene Expression Programming (GEP) to detecting web application attacks. This class of attacks relates to malicious activity of an intruder against applications, which use a database for storing data. The application uses SQL to retrieve data from the database and web server mechanisms to put them in a web browser. A poor implementation allows an attacker to modify SQL statements originally developed by a programmer, which leads to stealing or modifying data to which the attacker has not privileges. Intrusion detection problem is transformed into classification problem, which the objective is to classify SQL queries between either normal or malicious queries. GEP is used to find a function used for classification of SQL queries. Experimental results are presented on the basis of SQL queries of different length. The findings show that the efficiency of detecting SQL statements representing attacks depends on the length of SQL statements.