Automata-Based Model for SQL Injection Pattern Recognition

Author
Keywords
Abstract

SQL injection remains one of the most critical web application vulnerabilities, often used to bypass authentication and extract sensitive data. While many modern detection systems rely on machine learning or pattern matching, this study revisits classical computational models for recognizing interpretable SQLi patterns. Specifically, three automata-Deterministic Finite Automaton (DFA), Pushdown Automaton (PDA), and Turing Machine (TM)-are manually constructed to detect both a classic login bypass and a UNIONbased SQL injection pattern. A set of 40 handcrafted inputs was used to evaluate their pattern recognition capabilities. DFA effectively handles simple input sequences but fails with nested or logic-based constructs. PDA improves detection through stack-based handling of structured patterns, while TM provides the most comprehensive recognition by simulating conditional logic and multi-clause sequences. TM achieved 100% accuracy with no false negatives in complex cases, outperforming DFA and PDA. Although not deployable, these models highlight the pedagogical and conceptual utility of formal language theory in modeling and understanding injection attacks.

Year of Conference
2025
Publisher
Institute of Electrical and Electronics Engineers Inc.
ISBN Number
9798331513085 (ISBN)
URL
https://ieeexplore.ieee.org/document/11188186
DOI
10.1109/NMITCON65824.2025.11188186
Alternate Title
IEEE Int. Conf. Networks, Multimed. Inf. Technol., NMITCON
Conference Proceedings
Download citation
Cits
0
CIT

For admissions and all other information, please visit the official website of

Cambridge Institute of Technology

Cambridge Group of Institutions

Contact

Web portal developed and administered by Dr. Subrahmanya S. Katte, Dean - Academics.

Contact the Site Admin.