Results 11 to 20 of about 22,704 (203)

Deep Learning Architecture for Detecting SQL Injection Attacks Based on RNN Autoencoder Model

open access: yesMathematics, 2023
SQL injection attacks are one of the most common types of attacks on Web applications. These attacks exploit vulnerabilities in an application’s database access mechanisms, allowing attackers to execute unauthorized SQL queries. In this study, we propose
Maha Alghawazi   +2 more
doaj   +3 more sources

Enhancing the Performance of SQL Injection Attack Detection through Probabilistic Neural Networks

open access: yesApplied Sciences, 2023
SQL injection attack is considered one of the most dangerous vulnerabilities exploited to leak sensitive information, gain unauthorized access, and cause financial loss to individuals and organizations.
Fawaz Khaled Alarfaj, Nayeem Ahmad Khan
doaj   +3 more sources

Defeating SQL Injection

open access: yesComputer, 2013
The best strategy for combating SQL injection, which has emerged as the most widespread website security risk, calls for integrating defensive coding practices with both vulnerability detection and runtime attack prevention methods.
SHAR, Lwin Khin, TAN, Hee Beng Kuan
openaire   +5 more sources

A SQL Injection Detection Method Based on Adaptive Deep Forest

open access: yesIEEE Access, 2019
Injection attack is the first of the top 10 security threats announced by the OWASP. Meanwhile, SQL injection is one of the most important types among the injection attacks.
Qi Li   +3 more
doaj   +3 more sources

Effective SQL Injection Detection: A Fusion of Binary Olympiad Optimizer and Classification Algorithm

open access: yesMathematics
Since SQL injection allows attackers to interact with the database of applications, it is regarded as a significant security problem. By applying machine learning algorithms, SQL injection attacks can be identified.
Bahman Arasteh   +3 more
doaj   +3 more sources

Escrow: A large-scale web vulnerability assessment tool [PDF]

open access: yes, 2014
The reliance on Web applications has increased rapidly over the years. At the same time, the quantity and impact of application security vulnerabilities have grown as well.
Delamore, Baden, Ko, Ryan K.L.
core   +2 more sources

Enhanced pushdown automaton based static analysis for detection of SQL injection Hotspots in web application [PDF]

open access: yes, 2016
SQL injection Hotspots (SQLiHs) are Application’s Entry Points (AEPs) through which SQL injection is possible, subject to the application’s internal sanitization or validation capabilities.
Abdullah @ Selimun, Mohd Taufik   +4 more
core   +1 more source

DeepSQLi: Deep Semantic Learning for Testing SQL Injection

open access: yes, 2020
Security is unarguably the most serious concern for Web applications, to which SQL injection (SQLi) attack is one of the most devastating attacks. Automatically testing SQLi vulnerabilities is of ultimate importance, yet is unfortunately far from trivial
Anna Huang Cheng-Zhi   +15 more
core   +1 more source

Implementasi Web Application Firewall Dalam Mencegah Serangan SQL Injection Pada Website

open access: yesDigital Zone: Jurnal Teknologi Informasi dan Komunikasi, 2020
Dalam beberapa tahun terakhir perkembangan teknologi informasi menjadi semakin pesat, perkembangan ini membuat segala aktifitas dan pekerjaan menjadi lebih mudah, seperti halnya untuk mengakses berita maupun informasi.
Bangkit Wiguna   +2 more
doaj   +1 more source

SQL Vulnerability Detection System for PHP Program [PDF]

open access: yesJisuanji gongcheng, 2016
Aiming at PHP program,this paper proposes an Structured Query Language(SQL) vulnerability detection method based on the injection analysis technology.This method makes a detailed analysis on the injection in the aspects of data flow and program behavior ...
WANG Yaohui,WANG Dan,FU Lihua
doaj   +1 more source

Home - About - Disclaimer - Privacy