Results 11 to 20 of about 1,544,911 (270)

Enhancing the Performance of SQL Injection Attack Detection through Probabilistic Neural Networks [PDF]

open access: goldApplied Sciences, 2023
SQL injection attack is considered one of the most dangerous vulnerabilities exploited to leak sensitive information, gain unauthorized access, and cause financial loss to individuals and organizations.
Fawaz Khaled Alarfaj, Nayeem Ahmad Khan
doaj   +3 more sources

Review of SQL Injection : Problems and Prevention [PDF]

open access: yesJOIV: International Journal on Informatics Visualization, 2018
SQL injection happened in electronic records in database and it is still exist even after two decades since it first happened. Most of the web-based applications are still vulnerable to the SQL injection attacks.
Mohd Amin Mohd Yunus   +5 more
doaj   +5 more sources

Preventing SQL Injection through Automatic Query Sanitization with ASSIST [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2010
Web applications are becoming an essential part of our everyday lives. Many of our activities are dependent on the functionality and security of these applications. As the scale of these applications grows, injection vulnerabilities such as SQL injection
Raymond Mui, Phyllis Frankl
doaj   +4 more sources

SQL Injection

open access: diamondInternational Journal of Advanced Research in Science, Communication and Technology, 2022
SQL Injection (SQLi) could also be a kind of an injection attack that makes it possible to execute malicious SQL statements. These statements control a database server behind an internet application. Attackers can use SQL Injection vulnerabilities to bypass application security measures.
null Prof. P. S. Gawali   +3 more
openaire   +2 more sources

AE-Net: Novel Autoencoder-Based Deep Features for SQL Injection Attack Detection

open access: yesIEEE Access, 2023
Structured Query Language (SQL) injection attacks represent a critical threat to database-driven applications and systems, exploiting vulnerabilities in input fields to inject malicious SQL code into database queries.
Nisrean Thalji   +4 more
doaj   +2 more sources

Detection of SQL Injection Attack Using Machine Learning Techniques: A Systematic Literature Review

open access: yesJournal of Cybersecurity and Privacy, 2022
An SQL injection attack, usually occur when the attacker(s) modify, delete, read, and copy data from database servers and are among the most damaging of web application attacks.
Maha Alghawazi   +2 more
doaj   +2 more sources

Deep Learning Architecture for Detecting SQL Injection Attacks Based on RNN Autoencoder Model

open access: yesMathematics, 2023
SQL injection attacks are one of the most common types of attacks on Web applications. These attacks exploit vulnerabilities in an application’s database access mechanisms, allowing attackers to execute unauthorized SQL queries. In this study, we propose
Maha Alghawazi   +2 more
doaj   +2 more sources

Вразливості SQL-injection

open access: yesChallenges and Issues of Modern Science, 2023
SQL-injection (SQLi) це ін’єкційна атака, яка дозволяє втручатися в запити, які програма робить до своєї бази даних, і як зрозуміло з назви, запити відбуваються через стандартизовану мову запитів SQL.
Світлана Клименко   +1 more
doaj   +2 more sources

Effective SQL Injection Detection: A Fusion of Binary Olympiad Optimizer and Classification Algorithm

open access: yesMathematics
Since SQL injection allows attackers to interact with the database of applications, it is regarded as a significant security problem. By applying machine learning algorithms, SQL injection attacks can be identified.
Bahman Arasteh   +3 more
doaj   +2 more sources

SIDNet: A SQL Injection Detection Network for Enhancing Cybersecurity

open access: yesIEEE Access
SQL (Structured Query Language) injection is one of the most prevalent and dangerous forms of cyber-attacks, posing significant threats to database management systems and the overall security of web applications.
Debendra Muduli   +6 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy