Results 1 to 10 of about 10,223 (168)

SQL Injection Attack Roadmap and Fusion [PDF]

open access: yesIndian Journal of Science and Technology, 2016
With SQL Injection, an attacker can change the intended effect of dynamically generated query in a web Application. This can lead to unauthorized access to the database underlying web application, and harmful transactions on the potentially sensitive information contained in the database.
Umar, Kabir   +4 more
openaire   +3 more sources

Detection of SQL Injection Attack Using Machine Learning Techniques: A Systematic Literature Review

open access: yesJournal of Cybersecurity and Privacy, 2022
An SQL injection attack, usually occur when the attacker(s) modify, delete, read, and copy data from database servers and are among the most damaging of web application attacks.
Maha Alghawazi   +2 more
doaj   +1 more source

Web Application Penetration Testing Using SQL Injection Attack

open access: yesJOIV: International Journal on Informatics Visualization, 2021
A web application is a very important requirement in the information and digitalization era. With the increasing use of the internet and the growing number of web applications, every web application requires an adequate security level to store ...
Alde Alanda   +4 more
doaj   +1 more source

SSQLi: A Black-Box Adversarial Attack Method for SQL Injection Based on Reinforcement Learning

open access: yesFuture Internet, 2023
SQL injection is a highly detrimental web attack technique that can result in significant data leakage and compromise system integrity. To counteract the harm caused by such attacks, researchers have devoted much attention to the examination of SQL ...
Yuting Guan   +4 more
doaj   +1 more source

Long short‐term memory on abstract syntax tree for SQL injection detection

open access: yesIET Software, 2021
SQL injection attack (SQLIA) is a code injection technique, used to attack data‐driven applications by executing malicious SQL statements. Techniques like pattern matching, software testing and grammar analysis etc.
Z. Zhuo, T. Cai, X. Zhang, F. Lv
doaj   +1 more source

Deep Learning Technique-Enabled Web Application Firewall for the Detection of Web Attacks

open access: yesSensors, 2023
New techniques and tactics are being used to gain unauthorized access to the web that harm, steal, and destroy information. Protecting the system from many threats such as DDoS, SQL injection, cross-site scripting, etc., is always a challenging issue ...
Babu R. Dawadi   +2 more
doaj   +1 more source

Enhancing the Performance of SQL Injection Attack Detection through Probabilistic Neural Networks

open access: yesApplied Sciences, 2023
SQL injection attack is considered one of the most dangerous vulnerabilities exploited to leak sensitive information, gain unauthorized access, and cause financial loss to individuals and organizations.
Fawaz Khaled Alarfaj, Nayeem Ahmad Khan
doaj   +1 more source

Research on the SQL injection filtering based on SQL syntax tree

open access: yes网络与信息安全学报, 2016
The development of Web application make its areas become more and more widely.Followed by a security problem is becoming more and more serious,especially for the SQL injection attacks,which bring a huge challenge to the Web application security.A new SQL
Chen-wang HAN, Hui LIN, Chuan HUANG
doaj   +3 more sources

Systematic literature review on SQL injection attack [PDF]

open access: yes, 2016
SQL injection attack is a common threat to web applications that utilizes poor input validation to implement attack on a target database. It is becoming a very serious problem in web applications as successful execution leads to loss of integrity and ...
Aminu, Lawal Muhammad   +2 more
core   +1 more source

Implementasi Web Application Firewall Dalam Mencegah Serangan SQL Injection Pada Website

open access: yesDigital Zone: Jurnal Teknologi Informasi dan Komunikasi, 2020
Dalam beberapa tahun terakhir perkembangan teknologi informasi menjadi semakin pesat, perkembangan ini membuat segala aktifitas dan pekerjaan menjadi lebih mudah, seperti halnya untuk mengakses berita maupun informasi.
Bangkit Wiguna   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy