Simulating SQL Injection Vulnerability Exploitation Using Q-Learning Reinforcement Learning Agents

01/08/2021
by   Laszlo Erdodi, et al.
0

In this paper, we propose a first formalization of the process of exploitation of SQL injection vulnerabilities. We consider a simplification of the dynamics of SQL injection attacks by casting this problem as a security capture-the-flag challenge. We model it as a Markov decision process, and we implement it as a reinforcement learning problem. We then deploy different reinforcement learning agents tasked with learning an effective policy to perform SQL injection; we design our training in such a way that the agent learns not just a specific strategy to solve an individual challenge but a more generic policy that may be applied to perform SQL injection attacks against any system instantiated randomly by our problem generator. We analyze the results in terms of the quality of the learned policy and in terms of convergence time as a function of the complexity of the challenge and the learning agent's complexity. Our work fits in the wider research on the development of intelligent agents for autonomous penetration testing and white-hat hacking, and our results aim to contribute to understanding the potential and the limits of reinforcement learning in a security environment.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/03/2023

From Prompt Injections to SQL Injection Attacks: How Protected is Your LLM-Integrated Web Application?

Large Language Models (LLMs) have found widespread applications in vario...
research
06/22/2020

You shall not pass: Mitigating SQL Injection Attacks on Legacy Web Applications

SQL injection (SQLi) attacks pose a significant threat to the security o...
research
01/09/2019

Fuzzy neural networks to create an expert system for detecting attacks by SQL Injection

Its constant technological evolution characterizes the contemporary worl...
research
05/24/2020

DeepSQLi: Deep Semantic Learning for Testing SQL Injection

Security is unarguably the most serious concern for Web applications, to...
research
11/26/2018

ConsiDroid: A Concolic-based Tool for Detecting SQL Injection Vulnerability in Android Apps

Android is a famous OS among users. Existing vulnerabilities in Android ...
research
09/29/2020

Intrusion Detection Framework for SQL Injection

In this era of internet, E-Business and e-commerce applications are usin...
research
05/26/2020

Modeling Penetration Testing with Reinforcement Learning Using Capture-the-Flag Challenges and Tabular Q-Learning

Penetration testing is a security exercise aimed at assessing the securi...

Please sign up or login with your details

Forgot password? Click here to reset