Results 21 to 30 of about 1,544,911 (270)

From Prompt Injections to SQL Injection Attacks: How Protected is Your LLM-Integrated Web Application? [PDF]

open access: greenarXiv.org, 2023
Large Language Models (LLMs) have found widespread applications in various domains, including web applications, where they facilitate human interaction via chatbots with natural language interfaces. Internally, aided by an LLM-integration middleware such
Rodrigo Pedro   +3 more
openalex   +3 more sources

SQL Injection Detection Based on Lightweight Multi-Head Self-Attention

open access: yesApplied Sciences
This paper presents a novel neural network model for the detection of Structured Query Language (SQL) injection attacks for web applications. The model features high detection accuracy, fast inference speed, and low weight size.
Rui-Teng Lo   +2 more
doaj   +2 more sources

SSQLi: A Black-Box Adversarial Attack Method for SQL Injection Based on Reinforcement Learning

open access: yesFuture Internet, 2023
SQL injection is a highly detrimental web attack technique that can result in significant data leakage and compromise system integrity. To counteract the harm caused by such attacks, researchers have devoted much attention to the examination of SQL ...
Yuting Guan   +4 more
doaj   +2 more sources

Long short‐term memory on abstract syntax tree for SQL injection detection

open access: goldIET Software, 2021
SQL injection attack (SQLIA) is a code injection technique, used to attack data‐driven applications by executing malicious SQL statements. Techniques like pattern matching, software testing and grammar analysis etc.
Z. Zhuo, T. Cai, X. Zhang, F. Lv
doaj   +2 more sources

Detection of SQL Injection Attacks Based on Supervised Machine Learning Algorithms: A Review

open access: yesInternational Journal of Informatics, Information System and Computer Engineering
In the ever-changing world of cybersecurity, it is becoming more important to ensure integrity of web applications as well as securing sensitive data.
Hilmi Salih Abdullah   +1 more
doaj   +2 more sources

TrojanSQL: SQL Injection against Natural Language Interface to Database [PDF]

open access: goldConference on Empirical Methods in Natural Language Processing, 2023
The technology of text-to-SQL has significantly enhanced the efficiency of accessing and manipulating databases. However, limited research has been conducted to study its vulnerabilities emerging from malicious user interaction. By proposing TrojanSQL, a
Jinchuan Zhang   +5 more
openalex   +2 more sources

TPSQLi: Test Prioritization for SQL Injection Vulnerability Detection in Web Applications [PDF]

open access: goldApplied Sciences
The rapid proliferation of network applications has led to a significant increase in network attacks. According to the OWASP Top 10 Projects report released in 2021, injection attacks rank among the top three vulnerabilities in software projects.
Guan-Yan Yang   +6 more
openalex   +3 more sources

SQL Injection Detection Using RNN Deep Learning Model

open access: yesJournal of Applied Engineering and Technological Science, 2023
SQL injection attacks are a common type of cyber-attack that exploit vulnerabilities in web applications to access databases through malicious SQL queries.
Abdulbasit ALAzzawi
doaj   +1 more source

SQL Injection Attack Detection and Prevention Techniques Using Deep Learning [PDF]

open access: diamondJournal of Physics: Conference Series, 2021
Web application brings us convenience but also has some potential security problems. SQL injection attacks topped the list of Top 10 Network Security Problems released by OWASP, and the detection technology of SQL injection attacks has been one of the ...
Chen Ding   +3 more
openalex   +2 more sources

Home - About - Disclaimer - Privacy