Comparative Evaluation of Deep Learning Models, Security Tools, and Detection Frameworks for SQL Injection Attack Detection


  •  Fredrick Ochieng Okello    
  •  Andrew Kipkebut    
  •  Ruth Oginga    

Abstract

This study evaluated the performance of three major SQL injection (SQLi) detection categories—deep learning models, security tools, and structured detection frameworks. Experiments were conducted on a benchmark SQLi dataset derived from publicly available and synthetically augmented SQL traffic, with performance evaluated using accuracy, F1-score, AUC, latency, and false positive rate. Using this dataset containing diverse SQLi variants, the research compared hybrid CNN–LSTM–Autoencoder and Transformer-based models against widely used tools (SQLMap, Acunetix, Microsoft Defender for SQL, CodeScan Labs) and established frameworks (IDE, DIAVA, SQL Shield, ASTF). Deep learning models achieved the highest accuracy (≥0.99), followed by frameworks (0.86–0.96), while tools recorded the lowest detection capability (0.75–0.92). ANOVA results (F = 11.12, p = 0.0013) confirmed statistically significant performance differences. The findings demonstrate the superiority of deep learning—especially hybrid architectures integrating structural, sequential, and latent features—in detecting modern SQLi attacks. This comparative analysis provides empirical evidence supporting the prioritization of adaptive neural models in database security environments.



This work is licensed under a Creative Commons Attribution 4.0 License.
  • ISSN(Print): 1913-8989
  • ISSN(Online): 1913-8997
  • Started: 2008
  • Frequency: semiannual

Journal Metrics

WJCI (2022): 0.636

Impact Factor 2022 (by WJCI):  0.419

h-index (January 2024): 43

i10-index (January 2024): 193

h5-index (January 2024): N/A

h5-median(January 2024): N/A

( The data was calculated based on Google Scholar Citations. Click Here to Learn More. )

Contact