International Journal of Applied Information Systems |
Foundation of Computer Science (FCS), NY, USA |
Volume 12 - Number 37 |
Year of Publication: 2021 |
Authors: Abu Syeed Sajid Ahmed, Afsana Afrin Brishty, Mehjabeen Shachi, Nurnaby Siddiqui Shourav, Nazmus Sakib |
10.5120/ijais2021451912 |
Abu Syeed Sajid Ahmed, Afsana Afrin Brishty, Mehjabeen Shachi, Nurnaby Siddiqui Shourav, Nazmus Sakib . An Approach to Detect Cyber Attack on Server-side Application by using Data Mining Techniques and Evolutionary Algorithms. International Journal of Applied Information Systems. 12, 37 ( June 2021), 1-9. DOI=10.5120/ijais2021451912
Cyber Attack is one of the biggest problems for people of different levels, especially for the industries, which can maliciously disable systems, steal data. It is an assault launched by cyber criminals using one or more computers against single or multiple computers or networks. Server-side attacks are launched directly from an attacker to a listening service. Server-side attacks want to compromise and infringe with data and applications on a server. Applications like web browsers, media players, email servers, office suites, and similar applications are the main targets for attackers. An injection attack is one of the most common types of attack in which the hacker can steal valuable information from the database or server and it is the most dangerous attack aimed at web applications and can lead to data theft, data loss, loss of data integrity, denial of service, as well as full system compromise. Malicious requests make it easier for attackers to attack server-side applications. Our idea has been demonstrated in this paper where a two-layer security firewall is implemented in the server-side application to detect malicious code(SQL/NoSQL injection) using both machine learning and non-machine learning approach. The first layer of the firewall that will be placed between controller and router will be responsible for detecting malicious code from the request object using input validation and a parameterized statement which is a non-machine learning approach. Moreover, the second layer of the firewall will be placed between the controller and database to detect malicious code from the query using a machine learning model. We use text mining for feature extraction from the query, GridSearchCV for best model evaluation and genetic algorithm for automated hyperparameter optimization.