Hybrid Intrusion Detection System using Fuzzy Logic Inference Engine for SQL Injection Attack

Main Article Content

Rajif Agung Yunmar


SQL injection attacks toward web application increasingly prevalent. Testing to the web that will published is the one of preventive measures. However, this method sometimes ineffective because constrained by various things. Instrusion detection system (IDS) is able to help protect the website from various attacks. This study proposed an IDS for web applications from SQL injection-based attacks. The IDS is based on hybrid architecture with a signature-based detection method, type of data to analyzed is network packet and error log. The fuzzy logic inference engine used to be drawn the conclusion based on analyzed data. Proposed hybrid IDS has good result on detecting the various type of SQL injection attack and significantly reduce or even remove the false positive and false negative.


Download data is not yet available.

Article Details

How to Cite
YUNMAR, Rajif Agung. Hybrid Intrusion Detection System using Fuzzy Logic Inference Engine for SQL Injection Attack. Jurnal Ilmiah Kursor, [S.l.], v. 9, n. 3, oct. 2018. ISSN 2301-6914. Available at: <>. Date accessed: 24 sep. 2019. doi:


F. Valeur, D. Mutz, and G. Vigna, A Learning-Based Approach to the Detection of SQL Attacks, vol. 3548. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005.
[2] P. Technologies, “Web Application Attack Statistics Q1 2017.”
[3] WhiteHat Security, “Web Applications Security Statistics Report 2016,” 2016.
[4] M. P. Pathak, N. K. Khan, and T. C. Tantak, “A Survey to Detect and Prevent Web Attacks,” Int. J. Comput. Sci. Inf. Technol. Res., vol. 4, no. 1, pp. 46–52, 2016.
[5] G. Vigna and C. Kruegel, “Host-based Intrusion Detection,” in Handbook of Information Security, 2005, pp. 1–35.
[6] Y. Lin, Y. Zhang, and Y. Ou, “The Design and Implementation of Host-Based Intrusion Detection System,” in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics, 2010, pp. 595–598.
[7] B. Shanmugam and N. B. Idris, “Hybrid Intrusion Detection Systems ( HIDS ) using Fuzzy Logic,” INTECH Open Access Publ., pp. 135–154, 2011.
[8] H.-J. Liao, C.-H. Richard Lin, Y.-C. Lin, and K.-Y. Tung, “Intrusion detection system: A comprehensive review,” J. Netw. Comput. Appl., vol. 36, no. 1, pp. 16–24, Jan. 2013.
[9] L. A. Zadeh, “Making computers think like people,” IEEE Spectr., vol. 21, no. 8, pp. 26–32, Aug. 1984.
[10] L. A. Zadeh, “Fuzzy logic systems: origin, concepts, and trends,” in Science, 2004, pp. 16–18.
[11] S. Kusumadewi and H. Purnomo, Aplikasi Logika Fuzzy untuk Pendukung Keputusan Edisi Kedua. Yogyakarta: Graha Ilmu, 2010.
[12] S. Kusumadewi, Analisis dan desain Sistem Fuzzy menggunakan Toolbox Matlab. Yogyakarta: Graha Ilmu, 2002.

[13] C. Anley, Advanced SQL injection in SQL Server Applications. Next Generation Security Software Ltd, 2002.
[14] A. S. Irawan, E. S. Pramukantoro, and A. Kusyanti, “Pengembangan Intrusion Detection System Terhadap SQL Injection Menggunakan Metode Learning Vector Quantization,” J. Pengemb. Teknol. Inf. dan Ilmu Komput., vol. 2, no. 6, pp. 2295–2301, 2018.
[15] K. G. Maheswari and R. Anita, “An Intelligent Detection System for SQL Attacks on Web IDS in a Real-Time Application,” in Proceedings of the 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC – 16’), 2016, vol. 49, pp. 93–99.
[16] Z. S. Alwan and M. F. Younis, “Detection and Prevention of SQL Injection Attack: A Survey,” Int. J. Comput. Sci. Inf. Technol., vol. 6, no. 8, pp. 5–17, 2014.
[17] A. Bhat and P. Mumbarkar, “Intrusion Detection And Prevention System: SQL- Injection Attacks,” Int. J. Sci. Dev. Res., vol. 1, no. 5, pp. 18–21, 2010.
[18] Apache-Foundation, “Log Files - Apache HTTP Server Version 2.4,” 2017. [Online]. Available: [Accessed: 08-Nov-2017].
[19] R. K. Sharma and G. S. Chandel, “Novel Approach for Hybrid Intrusion Detection System,” vol. 1, no. 9, pp. 43–47, 2012.
[20] R. A. Yunmar, “Intrusion Prevention System untuk Aplikasi Berbasis Web,” STMIK AMIKOM Yogyakarta, 2010.
[21] J. Kroné and M. Bahtijaragic, “Intrusion Detection System by Statistical Learning,” Lund University, 2016.