Results 1 to 10 of about 1,990 (142)

Вразливості SQL-injection

open access: yesChallenges and Issues of Modern Science, 2023
SQL-injection (SQLi) це ін’єкційна атака, яка дозволяє втручатися в запити, які програма робить до своєї бази даних, і як зрозуміло з назви, запити відбуваються через стандартизовану мову запитів SQL.
Світлана Клименко   +1 more
doaj   +2 more sources

SQL Injection

open access: yesInternational Journal of Advanced Research in Science, Communication and Technology, 2022
SQL Injection (SQLi) could also be a kind of an injection attack that makes it possible to execute malicious SQL statements. These statements control a database server behind an internet application. Attackers can use SQL Injection vulnerabilities to bypass application security measures.
null Prof. P. S. Gawali   +3 more
openaire   +1 more source

SQL Injection Detection Using RNN Deep Learning Model

open access: yesJournal of Applied Engineering and Technological Science, 2023
SQL injection attacks are a common type of cyber-attack that exploit vulnerabilities in web applications to access databases through malicious SQL queries.
Abdulbasit ALAzzawi
doaj   +1 more source

AE-Net: Novel Autoencoder-Based Deep Features for SQL Injection Attack Detection

open access: yesIEEE Access, 2023
Structured Query Language (SQL) injection attacks represent a critical threat to database-driven applications and systems, exploiting vulnerabilities in input fields to inject malicious SQL code into database queries.
Nisrean Thalji   +4 more
doaj   +1 more source

Detection of SQL Injection Attack Using Machine Learning Techniques: A Systematic Literature Review

open access: yesJournal of Cybersecurity and Privacy, 2022
An SQL injection attack, usually occur when the attacker(s) modify, delete, read, and copy data from database servers and are among the most damaging of web application attacks.
Maha Alghawazi   +2 more
doaj   +1 more source

Web Application Penetration Testing Using SQL Injection Attack

open access: yesJOIV: International Journal on Informatics Visualization, 2021
A web application is a very important requirement in the information and digitalization era. With the increasing use of the internet and the growing number of web applications, every web application requires an adequate security level to store ...
Alde Alanda   +4 more
doaj   +1 more source

Research on the SQL injection filtering based on SQL syntax tree

open access: yes网络与信息安全学报, 2016
The development of Web application make its areas become more and more widely.Followed by a security problem is becoming more and more serious,especially for the SQL injection attacks,which bring a huge challenge to the Web application security.A new SQL
Chen-wang HAN, Hui LIN, Chuan HUANG
doaj   +3 more sources

Preventing SQL Injection through Automatic Query Sanitization with ASSIST [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2010
Web applications are becoming an essential part of our everyday lives. Many of our activities are dependent on the functionality and security of these applications. As the scale of these applications grows, injection vulnerabilities such as SQL injection
Raymond Mui, Phyllis Frankl
doaj   +1 more source

DETECTION OF SQL INJECTION VULNERABILITY IN CODEIGNITER FRAMEWORK USING STATIC ANALYSIS

open access: yesMultitek Indonesia, 2023
QL Injection attacks are still one type of attack that often occurs in web-based applications. The causes and ways to prevent SQL Injection have been widely explained in various sources.
Muhammad Fahmi Al Azhar, Ruki Harwahyu
doaj   +1 more source

Deep Learning Architecture for Detecting SQL Injection Attacks Based on RNN Autoencoder Model

open access: yesMathematics, 2023
SQL injection attacks are one of the most common types of attacks on Web applications. These attacks exploit vulnerabilities in an application’s database access mechanisms, allowing attackers to execute unauthorized SQL queries. In this study, we propose
Maha Alghawazi   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy