{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T20:01:55Z","timestamp":1773777715267,"version":"3.50.1"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T00:00:00Z","timestamp":1704758400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T00:00:00Z","timestamp":1704758400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100018573","name":"Istanbul Medeniyet University","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100018573","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,4]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>SQL injection (SQLi) attacks are one of the oldest and most serious security threats, consistently ranking among the top ten critical web security risks. Traditional defense mechanisms against SQL injection predominantly use blacklists to disallow common injection characters or terms. However, the major challenge for these systems is to create a comprehensive list of potential SQLi characters, terms, and multi-terms that encompass various types of SQLi attacks (time-based, error-based, etc.), taking into account various SQL datasets (such as MySQL, Oracle, and NoSQL). Recently, some research studies have concentrated on feature learning from SQL queries by applying some well-known deep architectures to detect SQLi attacks. Motivated by a similar objective, this research introduces a novel deep learning-based SQLi detection system named \u201cBidirectional LSTM-CNN based on Multi-View Consensus\u201d (MVC-BiCNN). The proposed method implements a pre-processing step that generates multiple views from SQL data by semantically encoding SQL statements into their corresponding SQL tags. By utilizing two different main layers, which are bidirectional long short-term memory (LSTM) and convolutional neural network (CNN), the proposed method learns a joint latent space from multi-view representations. In the detection phase, the proposed method yields separate predictions for each representation and assesses whether the query constitutes an SQLi attack based on a consensus function\u2019s output. Moreover, Interpretable Model-Agnostic Annotations (LIME), one of the methods of Explainable Artificial Intelligence (XAI), is employed for the purpose of interpreting the model\u2019s results and analyzing the SQL injection (SQLi) inputs. The experimental results demonstrate that MVC-BiCNN outperforms the baseline methods, yielding 99.96% detection rate.<\/jats:p>","DOI":"10.1007\/s10207-023-00791-y","type":"journal-article","created":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T12:02:07Z","timestamp":1704801727000},"page":"1541-1556","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["A deep learning approach based on multi-view consensus for SQL injection detection"],"prefix":"10.1007","volume":"23","author":[{"given":"Arzu Gorgulu","family":"Kakisim","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,9]]},"reference":[{"key":"791_CR1","doi-asserted-by":"publisher","unstructured":"Lee, I., Jeong, S., Yeo, S., Moon, J.: A novel method for SQL injection attack detection based on removing SQL query attribute values. Mathematical and Computer Modelling, 55 (1-2), (2012) (Jan 1) 58-68. https:\/\/doi.org\/10.1016\/j.mcm.2011.01.050","DOI":"10.1016\/j.mcm.2011.01.050"},{"key":"791_CR2","doi-asserted-by":"publisher","unstructured":"Shar, L. K., Tan, H. B.: Defeating SQL injection. Computer, 46 (3), (2012) (Aug 10) 69-77.https:\/\/doi.org\/10.1109\/MC.2012.283","DOI":"10.1109\/MC.2012.283"},{"key":"791_CR3","doi-asserted-by":"publisher","unstructured":"Atoum, J. O., Qaralleh, A. J.: A hybrid technique for SQL injection attacks detection and prevention. International Journal of Database Management Systems, 6 (1), (2014) (Feb 1) 21. https:\/\/doi.org\/10.5121\/ijdms.2014.6102","DOI":"10.5121\/ijdms.2014.6102"},{"key":"791_CR4","doi-asserted-by":"publisher","unstructured":"Aliero, M. S., Ghani, I., Qureshi, K. N., Rohani, M. F.: An algorithm for detecting SQL injection vulnerability using black-box testing. Journal of Ambient Intelligence and Humanized Computing, 11 (1), (2020) (Jan) 249-66. https:\/\/doi.org\/10.1007\/s12652-019-01235-z","DOI":"10.1007\/s12652-019-01235-z"},{"key":"791_CR5","unstructured":"Latchoumi, T. P., Reddy, M. S., Balamurugan, K.: Applied machine learning predictive analytics to SQL injection attack detection and prevention. European Journal of Molecular & Clinical Medicine, 7 (02), (2020)"},{"key":"791_CR6","doi-asserted-by":"crossref","unstructured":"Zhang, W., Li, Y., Li, X., Shao, M., Mi, Y., Zhang, H., Zhi, G.: Deep Neural Network-Based SQL Injection Detection Method. Security and Communication Networks, (2022) (March 24)","DOI":"10.1155\/2022\/4836289"},{"key":"791_CR7","doi-asserted-by":"publisher","unstructured":"Alaoui, R. L., Nfaoui, E. H.: Deep Learning for Vulnerability and Attack Detection on Web Applications: A Systematic Literature Review. Future Internet, 14(4), (2022) (Apr 13) 118. https:\/\/doi.org\/10.3390\/fi14040118","DOI":"10.3390\/fi14040118"},{"key":"791_CR8","doi-asserted-by":"publisher","unstructured":"Tang, P., Qiu, W., Huang, Z., Lian, H., Liu, G.: Detection of SQL injection based on artificial neural network. Knowledge-Based Systems, 190:105528, (2020) (Feb 29). https:\/\/doi.org\/10.1016\/j.knosys.2020.105528","DOI":"10.1016\/j.knosys.2020.105528"},{"key":"791_CR9","doi-asserted-by":"publisher","unstructured":"Zhuo, Z., Cai, T., Zhang, X., Lv, F.: Long short\u2013term memory on abstract syntax tree for SQL injection detection. IET Software, 15 (2), (2021) (Apr) 188-97. https:\/\/doi.org\/10.1049\/sfw2.12018","DOI":"10.1049\/sfw2.12018"},{"key":"791_CR10","doi-asserted-by":"publisher","unstructured":"Abaimov, S., Bianchi, G.: CODDLE: Code-injection detection with deep learning. IEEE Access, 7, (2019) (Sep 13) 128617-27. https:\/\/doi.org\/10.1109\/ACCESS.2019.2939870","DOI":"10.1109\/ACCESS.2019.2939870"},{"key":"791_CR11","doi-asserted-by":"publisher","unstructured":"Xie, X., Ren, C., Fu, Y., Xu, J., Guo, J.: Sql injection detection for web applications based on elastic-pooling cnn. IEEE Access, 7, (2019) (Oct 21) 151475-81. https:\/\/doi.org\/10.1109\/ACCESS.2019.2947527","DOI":"10.1109\/ACCESS.2019.2947527"},{"key":"791_CR12","doi-asserted-by":"crossref","unstructured":"Fang, Y., Peng, J., Liu, L., Huang, C.: WOVSQLI: Detection of SQL injection behaviors using word vector and LSTM. InProceedings of the 2nd international conference on cryptography, security and privacy (2018) (Mar 16) 170-174","DOI":"10.1145\/3199478.3199503"},{"key":"791_CR13","doi-asserted-by":"publisher","unstructured":"Fang, Y., Huang, C., Su, Y., Qiu, Y.: Detecting malicious JavaScript code based on semantic analysis. Computers & Security, 93:101764, (2020) (Jun 1). https:\/\/doi.org\/10.1016\/j.cose.2020.101764","DOI":"10.1016\/j.cose.2020.101764"},{"key":"791_CR14","unstructured":"Gould, C., Su, Z., Devanbu, P.: JDBC checker: A static analysis tool for SQL\/JDBC applications. IEEE InProceedings. 26th International Conference on Software Engineering (2004) (May 28) 697-698"},{"key":"791_CR15","doi-asserted-by":"crossref","unstructured":"Halfond, W. G., Orso, A.: AMNESIA: analysis and monitoring for neutralizing SQL-injection attacks. InProceedings of the 20th IEEE\/ACM international Conference on Automated software engineering, (2005) (Nov 7) 174-183","DOI":"10.1145\/1101908.1101935"},{"key":"791_CR16","doi-asserted-by":"crossref","unstructured":"Bisht, P., Madhusudan, P., Venkatakrishnan, V. N.: CANDID: Dynamic candidate evaluations for automatic prevention of SQL injection attacks. ACM Transactions on Information and System Security (TISSEC), 13(2), (2010) (Mar 5) 1-39","DOI":"10.1145\/1698750.1698754"},{"key":"791_CR17","doi-asserted-by":"crossref","unstructured":"Thomas, S., Williams, L.: Using automated fix generation to secure SQL statements. In Third International Workshop on Software Engineering for Secure Systems, IEEE, (SESS\u201907: ICSE Workshops 2007), (2007)(May 20) 9-9","DOI":"10.1109\/SESS.2007.12"},{"key":"791_CR18","doi-asserted-by":"crossref","unstructured":"Xiao, Z., Zhou, Z., Yang, W., Deng, C.: An approach for SQL injection detection based on behavior and response analysis. In2017 IEEE 9th International Conference on Communication Software and Networks (ICCSN), IEEE, (2017) (May 6) 1437-1442","DOI":"10.1109\/ICCSN.2017.8230346"},{"key":"791_CR19","doi-asserted-by":"crossref","unstructured":"Hasan, M., Balbahaith, Z., Tarique, M.: Detection of SQL injection attacks: a machine learning approach. In2019 International Conference on Electrical and Computing Technologies and Applications (ICECTA) (2019) Nov 19 (pp. 1-6). IEEE","DOI":"10.1109\/ICECTA48151.2019.8959617"},{"key":"791_CR20","doi-asserted-by":"crossref","unstructured":"Choi, J., Kim, H., Choi, C., Kim, P.: Efficient malicious code detection using n-gram analysis and SVM. In2011 14th International Conference on Network-Based Information Systems,IEEE, (2011) (Sep 7) 618-621","DOI":"10.1109\/NBiS.2011.104"},{"key":"791_CR21","doi-asserted-by":"crossref","unstructured":"Joshi, A., Geetha, V.: SQL Injection detection using machine learning. In2014 international conference on control, instrumentation, communication and computational technologies (ICCICCT),IEEE, (2014) (Jul 10) 1111-1115","DOI":"10.1109\/ICCICCT.2014.6993127"},{"key":"791_CR22","doi-asserted-by":"crossref","unstructured":"Kamtuo, K., Soomlek, C.: Machine Learning for SQL injection prevention on server-side scripting. In2016 International Computer Science and Engineering Conference (ICSEC), IEEE, (2016) (Dec 14) 1-6","DOI":"10.1109\/ICSEC.2016.7859950"},{"key":"791_CR23","doi-asserted-by":"publisher","unstructured":"McWhirter, P. R., Kifayat, K., Shi, Q., Askwith, B.: SQL Injection Attack classification through the feature extraction of SQL query strings using a Gap-Weighted String Subsequence Kernel. Journal of information security and applications, 40, (2018) (Jun 1) 199-216. https:\/\/doi.org\/10.1016\/j.jisa.2018.04.001","DOI":"10.1016\/j.jisa.2018.04.001"},{"key":"791_CR24","doi-asserted-by":"publisher","unstructured":"Li, Q., Wang, F., Wang, J., Li, W.: LSTM-based SQL injection detection method for intelligent transportation system. IEEE Transactions on Vehicular Technology, 68 (5), (2019) (Jan 17) 4182-91. https:\/\/doi.org\/10.1109\/TVT.2019.2893675","DOI":"10.1109\/TVT.2019.2893675"},{"key":"791_CR25","doi-asserted-by":"crossref","unstructured":"Luo, A., Huang, W., Fan, W.: A CNN-based Approach to the Detection of SQL Injection Attacks. In 2019 IEEE\/ACIS 18th International Conference on Computer and Information Science (ICIS), IEEE, (2019) (Jun 17) 320-324","DOI":"10.1109\/ICIS46139.2019.8940196"},{"key":"791_CR26","doi-asserted-by":"publisher","unstructured":"Greff, K., Srivastava, R. K., Koutn\u00edk, J., Steunebrink, B. R., Schmidhuber, J.: LSTM: A search space odyssey. IEEE transactions on neural networks and learning systems, 28 (10), (2016) (Jul 8) 2222-32. https:\/\/doi.org\/10.1109\/TNNLS.2016.2582924","DOI":"10.1109\/TNNLS.2016.2582924"},{"key":"791_CR27","doi-asserted-by":"crossref","unstructured":"Fang, Y., Qiu, Y., Liu, L., Huang, C.: Detecting webshell based on random forest with fasttext. InProceedings of the 2018 International Conference on Computing and Artificial Intelligence, (2018) (Mar 12) 52-56","DOI":"10.1145\/3194452.3194470"},{"key":"791_CR28","doi-asserted-by":"crossref","unstructured":"Qin, B., Wang, Y., Ma, C.: API call based ransomware dynamic detection approach using textCNN. In2020 International Conference on Big Data, Artificial Intelligence and Internet of Things Engineering (ICBAIE), IEEE, (2020) (Jun 12) 162-166","DOI":"10.1109\/ICBAIE49996.2020.00041"},{"key":"791_CR29","doi-asserted-by":"crossref","unstructured":"Li, Q., Li, W., Wang, J., Cheng, M.: A SQL injection detection method based on adaptive deep forest. IEEE Access, 7:145385, (2019) (Oct 1); 94","DOI":"10.1109\/ACCESS.2019.2944951"},{"key":"791_CR30","doi-asserted-by":"crossref","unstructured":"Ribeiro, M. T., Singh, S., Guestrin, C. : \u201c Why should i trust you?\u201d Explaining the predictions of any classifier. In Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining, (2016) (August) 1135-1144","DOI":"10.1145\/2939672.2939778"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00791-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-023-00791-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00791-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,27]],"date-time":"2024-03-27T07:45:20Z","timestamp":1711525520000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-023-00791-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,9]]},"references-count":30,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,4]]}},"alternative-id":["791"],"URL":"https:\/\/doi.org\/10.1007\/s10207-023-00791-y","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,9]]},"assertion":[{"value":"9 January 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}