An Improved LSTM-PCA Ensemble Classifier for SQL Injection and XSS Attack Detection

Stiawan D., Subroto I.M.I., Lukman, Idris M.Y., Septian T.W., Heryanto A., Bardadi A., Afifah N., Melinda L., Budiarto R.

Abstract

The Repository Mahasiswa (RAMA) is a national repository of research reports in the form of final assignments, student projects, theses, dissertations, and research reports of lecturers or researchers that have not yet been published in journals, conferences, or integrated books from the scientific repository of universities and research institutes in Indonesia. The increasing popularity of the RAMA Repository leads to security issues, including the two most widespread, vulnerable attacks i.e., Structured Query Language (SQL) injection and cross-site scripting (XSS) attacks. An attacker gaining access to data and performing unauthorized data modifications is extremely dangerous. This paper aims to provide an attack detection system for securing the repository portal from the abovementioned attacks. The proposed system combines a Long Short–Term Memory and Principal Component Analysis (LSTM-PCA) model as a classifier. This model can effectively solve the vanishing gradient problem caused by excessive positive samples. The experiment results show that the proposed system achieves an accuracy of 96.85% using an 80%:20% ratio of training data and testing data. The rationale for this best achievement is that the LSTM’s Forget Gate works very well as the PCA supplies only selected features that are significantly relevant to the attacks’ patterns. The Forget Gate in LSTM is responsible for deciding which information should be kept for computing the cell state and which one is not relevant and can be discarded. In addition, the LSTM’s Input Gate assists in finding out crucial information and stores specific relevant data in the memory.

Journal
Computer Systems Science and Engineering
Page Range
1759-1774
Publication date
2023
Total citations
Effect of dataset size and train/test split ratios in qsar/qspr multiclass classification

Bajusz D., Heberger K., Racz A.

A novel wavelet sequences based on deep bidirectional LSTM network model for ECG signal classification

Yildirim O.

OGRU: An Optimized Gated Recurrent Unit Neural Network

Liu J., Shi W., Wang X., Xu J.

Fundamentals of Recurrent Neural Network (RNN) and Long Short-Term Memory (LSTM) network

Sherstinsky A.

Fundus image classification using VGG-19 architecture with PCA and SVD

Huang Z., Mateen M., Nasrullah, Song S., Wen J.

A hybrid method for detection and prevention of SQL injection attacks

Ghafarian A.

No Title

Web attack detection using deep learning models

Christy Eunaicy J.I., Suguna S.

CODDLE: Code-Injection Detection with Deep Learning

Abaimov S., Bianchi G.

Classification of XSS Attacks by Machine Learning with Frequency of Appearance and Co-occurrence

Akaishi S., Uda R.

Automatic Alert Categories Standardization for Heterogeneous Devices with Incomplete Semantic Knowledge Based on LSTM

Zang T., Wang H., Li B., Jia S., Li J., Ding Y., Yang Y., Qi Z.

Lecture Notes in Computer Science

ENHANCING SQL INJECTION (SQLI) MITIGATION BY REMOVING MALICIOUS SQL PARAMETER VALUES USING LONG SHORT-TERM MEMORY (LSTM) NEURAL NETWORKS

Sharif K.Y., Osman M.H., Augustine N., Sultan A.B.Md.

Journal of Theoretical and Applied Information Technology

An Intelligent Approach for Classification In-Band SQLi Attacks Using Machine Learning Techniques

Jhanjhi N.Z., Shah I.A.

Proceedings of 2025 4th International Conference on Computing and Information Technology Iccit 2025

SQL injection detection algorithm based on a fusion network of syntax and semantic features

Zhang D., Ma H., Chen B., Zhang W.

Proceedings of SPIE the International Society for Optical Engineering

Multi-Class Classification of Code Injection Attacks Using the Support Vector Machine Algorithm

Proceedings 2025 4th International Conference on Electronics Representation and Algorithm Artificial Intelligence Creating Tomorrow S World Today Icera 2025

Machine and Deep Learning-based XSS Detection Approaches: A Systematic Literature Review

Samsudin K., Hashim S.J., Hashim F., Thajeel I.K.

Journal of King Saud University Computer and Information Sciences

Research on SQL Vulnerability Mining Based on Manual Operation

Zhang G., Zheng Q.

3rd IEEE International Conference on Mobile Networks and Wireless Communications Icmnwc 2023

Access to Document