Results 11 to 20 of about 10,242 (187)

SQL Injection Detection Using RNN Deep Learning Model

open access: yesJournal of Applied Engineering and Technological Science, 2023
SQL injection attacks are a common type of cyber-attack that exploit vulnerabilities in web applications to access databases through malicious SQL queries.
Abdulbasit ALAzzawi
doaj   +1 more source

A SQL Injection Detection Method Based on Adaptive Deep Forest

open access: yesIEEE Access, 2019
Injection attack is the first of the top 10 security threats announced by the OWASP. Meanwhile, SQL injection is one of the most important types among the injection attacks.
Qi Li   +3 more
doaj   +1 more source

DETECTION OF SQL INJECTION VULNERABILITY IN CODEIGNITER FRAMEWORK USING STATIC ANALYSIS

open access: yesMultitek Indonesia, 2023
QL Injection attacks are still one type of attack that often occurs in web-based applications. The causes and ways to prevent SQL Injection have been widely explained in various sources.
Muhammad Fahmi Al Azhar, Ruki Harwahyu
doaj   +1 more source

SQL Injection Attack: Quick View

open access: yesMesopotamian Journal of CyberSecurity, 2023
SQL injection is a type of security vulnerability that occurs in database-driven web applications where an attacker injects malicious code into the application to gain unauthorized access to sensitive information. This paper aims to provide a comprehensive and systematic review of the existing methods for preventing and detecting SQL injection attacks.
Vugar Abdullayev, Alok Singh Chauhan
openaire   +1 more source

SQL injection attacks countermeasures assessments

open access: yesIndonesian Journal of Electrical Engineering and Computer Science, 2021
<span>SQL injections attacks have been rated as the most dangerous vulnerability of web-based systems over more than a decade by OWASP top ten. Though different static, runtime and hybrid approaches have been proposed to counter SQL injection attacks, no single approach guarantees flawless prevention/ detection for these attacks.
Mamdouh Alenezi   +2 more
openaire   +2 more sources

ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems [PDF]

open access: yes, 2007
We present an architecture designed for alert verification (i.e., to reduce false positives) in network intrusion-detection systems. Our technique is based on a systematic (and automatic) anomaly-based analysis of the system output, which provides useful
Bolzoni, Damiano   +2 more
core   +10 more sources

Preventing SQL Injection Attacks

open access: yesInternational Journal of Computer Applications, 2012
With the recent rapid increase in web based applications that employ back-end database services, results show that SQL Injection and Remote File Inclusion are the two frequently used exploits rather than using other complicated techniques. With the rise in use of web applications, SQL injection based attacks are gradually increasing and is now one of ...
Vaidhyanathan.G Vaidhyanathan.G   +2 more
openaire   +1 more source

Classification of logical vulnerability based on group attacking method [PDF]

open access: yes, 2020
New advancement in the field of e-commerce software technology has also brought many benefits, at the same time developing process always face different sort of problems from design phase to implement phase.
Nabi, Faisal   +2 more
core   +2 more sources

Provably throttling SQLI using an enciphering query and secure matching

open access: yesEgyptian Informatics Journal, 2022
Web applications, which dominate the internet, act as communication media between customers and service providers. Web applications are an internet innovation that provide customer services such as e-banking, e-commerce and e-booking.
Mohammed Abdulridha Hussain   +7 more
doaj   +1 more source

SQLrand: Preventing SQL Injection Attacks [PDF]

open access: yes, 2004
We present a practical protection mechanism against SQL injection attacks. Such attacks target databases that are accessible through a web front-end, and take advantage of flaws in the input validation logic of Web components such as CGI scripts. We apply the concept of instruction-set randomization to SQL, creating instances of the language that are ...
Boyd, Stephen W., Keromytis, Angelos D.
openaire   +2 more sources

Home - About - Disclaimer - Privacy