Results 11 to 20 of about 10,242 (187)
SQL Injection Detection Using RNN Deep Learning Model
SQL injection attacks are a common type of cyber-attack that exploit vulnerabilities in web applications to access databases through malicious SQL queries.
Abdulbasit ALAzzawi
doaj +1 more source
A SQL Injection Detection Method Based on Adaptive Deep Forest
Injection attack is the first of the top 10 security threats announced by the OWASP. Meanwhile, SQL injection is one of the most important types among the injection attacks.
Qi Li +3 more
doaj +1 more source
DETECTION OF SQL INJECTION VULNERABILITY IN CODEIGNITER FRAMEWORK USING STATIC ANALYSIS
QL Injection attacks are still one type of attack that often occurs in web-based applications. The causes and ways to prevent SQL Injection have been widely explained in various sources.
Muhammad Fahmi Al Azhar, Ruki Harwahyu
doaj +1 more source
SQL Injection Attack: Quick View
SQL injection is a type of security vulnerability that occurs in database-driven web applications where an attacker injects malicious code into the application to gain unauthorized access to sensitive information. This paper aims to provide a comprehensive and systematic review of the existing methods for preventing and detecting SQL injection attacks.
Vugar Abdullayev, Alok Singh Chauhan
openaire +1 more source
SQL injection attacks countermeasures assessments
<span>SQL injections attacks have been rated as the most dangerous vulnerability of web-based systems over more than a decade by OWASP top ten. Though different static, runtime and hybrid approaches have been proposed to counter SQL injection attacks, no single approach guarantees flawless prevention/ detection for these attacks.
Mamdouh Alenezi +2 more
openaire +2 more sources
ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems [PDF]
We present an architecture designed for alert verification (i.e., to reduce false positives) in network intrusion-detection systems. Our technique is based on a systematic (and automatic) anomaly-based analysis of the system output, which provides useful
Bolzoni, Damiano +2 more
core +10 more sources
Preventing SQL Injection Attacks
With the recent rapid increase in web based applications that employ back-end database services, results show that SQL Injection and Remote File Inclusion are the two frequently used exploits rather than using other complicated techniques. With the rise in use of web applications, SQL injection based attacks are gradually increasing and is now one of ...
Vaidhyanathan.G Vaidhyanathan.G +2 more
openaire +1 more source
Classification of logical vulnerability based on group attacking method [PDF]
New advancement in the field of e-commerce software technology has also brought many benefits, at the same time developing process always face different sort of problems from design phase to implement phase.
Nabi, Faisal +2 more
core +2 more sources
Provably throttling SQLI using an enciphering query and secure matching
Web applications, which dominate the internet, act as communication media between customers and service providers. Web applications are an internet innovation that provide customer services such as e-banking, e-commerce and e-booking.
Mohammed Abdulridha Hussain +7 more
doaj +1 more source
SQLrand: Preventing SQL Injection Attacks [PDF]
We present a practical protection mechanism against SQL injection attacks. Such attacks target databases that are accessible through a web front-end, and take advantage of flaws in the input validation logic of Web components such as CGI scripts. We apply the concept of instruction-set randomization to SQL, creating instances of the language that are ...
Boyd, Stephen W., Keromytis, Angelos D.
openaire +2 more sources

