AN ENSEMBLE OF TOKENIZATION, AUTOENCODER AND TEMPORAL CONVOLUTIONAL NETWORK FOR SQL INJECTION DETECTION.

Authors

  • JOSEPH OMOIBU OKHUOYA Cybersecurity Department, University of Benin, Benin city, Edo State, Nigeria. Author
  • R. O. AKINYEDE Information Systems and Security department, Federal university of technology, Akure, Ondo State, Nigeria Author
  • G. B. IWASOKUN Software Engineering Department, Federal university of technology, Akure, Ondo State, Nigeria Author
  • JUNIOR GABRIEL AROME Cybersecurity Department, Federal university of technology, Akure, Ondo State, Nigeria Author

DOI:

https://doi.org/10.60787/tnamp.v23.625

Keywords:

SQL Injection, Deep Learning, Temporal Convolutional Network, Autoencoder, Cybersecurity

Abstract

SQL Injection (SQLi) attacks remain a critical cybersecurity threat, with traditional detection methods struggling against novel attack patterns. This study proposes a hybrid deep learning architecture combining SQL-aware tokenization, a 1D Convolutional Autoencoder (1D-CAE), and a Temporal Convolutional Network (TCN) for robust SQLi detection. The framework leverages the autoencoder for unsupervised anomaly detection and the TCN for temporal sequence modeling. Evaluated on 30,918 SQL queries, the proposed ensemble achieved 98.53% accuracy, 92.5% precision, 95.5% recall, and 94.0% F1-score, significantly outperforming Random Forest (87.0% F1-score) and individual model components. The TCN's parallel processing capability enabled 12.3 milliseconds average inference time per query, supporting real-time deployment. The fusion of anomaly-based and sequence-based deep learning provides an efficient, scalable defense against both known and zero-day SQLi attacks.

         Views | Downloads: 4 / 2

Downloads

Download data is not yet available.

References

Bai, S., Kolter, J. Z., & Koltun, V. (2018). An empirical evaluation of generic convolutional and recurrent networks for sequence modeling. arXiv preprint arXiv:1803.01271. <https://doi.org/10.48550/arXiv.1803.01271>

Chawla, N. V., Bowyer, K. W., Hall, L. O., & Kegelmeyer, W. P. (2002). SMOTE: Synthetic minority over-sampling technique. Journal of Artificial Intelligence Research, 16, 321–357. <https://doi.org/10.1613/jair.953>

Fortinet. (2023). What is SQL injection (SQLi) and how to prevent it? Fortinet. Retrieved from <https://www.fortinet.com/resources/cyberglossary/sql-injection>

Ketema, B., & Sharma, D. (2022). A survey on deep learning-based SQL injection detection. Journal of Cybersecurity and Privacy, 2(3), 524–543. <https://doi.org/10.3390/jcp2030027>

Nanang, A. (2023). A comprehensive review of blind SQL injection attacks and mitigation techniques. International Journal of Computer Science and Network Security, 23(1), 1–10.

Naser, M., Al-Rousan, T., & Al-Shargabi, B. (2022). A comprehensive survey on SQL injection attacks: A systematic literature review. IEEE Access, 10, 84999–85021. <https://doi.org/10.1109/ACCESS.2022.3197533>

Neel, S., & Sharma, T. (2023). A systematic review of deep learning techniques for SQL injection detection. Journal of King Saud University - Computer and Information Sciences, 35(1), 23–37. <https://doi.org/10.1016/j.jksuci.2022.11.015>

OWASP. (2024). OWASP Top 10:2024. Open Web Application Security Project. Retrieved from <https://owasp.org/www-project-top-ten/>

Shahriar, H., & Zulkernine, M. (2023). A survey on SQL injection attacks: Vulnerabilities and countermeasures. ACM Computing Surveys, 55(1), 1–38. <https://doi.org/10.1145/3507909>

Vinayakumar, R., Soman, K. P., & Poornachandran, P. (2017). Applying convolutional neural network for network intrusion detection. In 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI) (pp. 1222-1228). IEEE. <https://doi.org/10.1109/ICACCI.2017.812322115.8>

Downloads

Published

2026-01-07

Issue

Section

Articles

How to Cite

AN ENSEMBLE OF TOKENIZATION, AUTOENCODER AND TEMPORAL CONVOLUTIONAL NETWORK FOR SQL INJECTION DETECTION. (2026). The Transactions of the Nigerian Association of Mathematical Physics, 23, 105-116. https://doi.org/10.60787/tnamp.v23.625

Share