Results 21 to 30 of about 10,242 (187)
DeepSQLi: Deep Semantic Learning for Testing SQL Injection
Security is unarguably the most serious concern for Web applications, to which SQL injection (SQLi) attack is one of the most devastating attacks. Automatically testing SQLi vulnerabilities is of ultimate importance, yet is unfortunately far from trivial
Anna Huang Cheng-Zhi +15 more
core +1 more source
Ensemble Machine Learning Approaches for Detection of SQL Injection Attack
In the current era, SQL Injection Attack is a serious threat to the security of the ongoing cyber world particularly for many web applications that reside over the internet. Many webpages accept the sensitive information (e.g.
Umar Farooq
doaj +1 more source
Early Detection of SQL Injection Attacks
SQL Injection (SQLI) is a common vulnerability found in web applications. The starting point of SQLI attack is the client-side (browser). If attack inputs can be detected early at the browse side, then it could be thwarted early by not forwarding the malicious inputs to the server-side for further processing.
Shahriar, Hossain +2 more
openaire +1 more source
SQLMVED: SQL injection runtime prevention system based on multi-variant execution
The effectiveness of combining SQL statement parsing with randomization to defend against SQL injection attack (SQLIA) was based on the fact that attackers did not know about the current method of randomization adopted by system.Therefore, once attackers
Bolin MA +3 more
doaj +2 more sources
Simulating SQL-Injection Cyber-Attacks Using GNS3 [PDF]
Network Forensics is a subtopic of Digital Forensics\ud wherein research on artificat investigations and intrusions evidence acquisition is addressed. Among many challenges in the field, the problem of losing data artifacts in the state of flux, (i.e., live volatile data), when network devices are suddenly non-operational remains a topic of interest to
Tobin, Patrick +3 more
openaire +1 more source
Penetration test method using blind SQL injection based on second-order fragment and reassembly
How to get rid of the blindness of current SQL injection penetration test,produce the optimized attack pattern of SQL injection,enhance the effectiveness in the phase of attack generation,and improve the accuracy of vulnerability detection of SQL ...
De-guang LE +4 more
doaj +2 more sources
Using Nlp Techniques To Detect Sql Injection Attack
Most of the applications used on the internet are Web-Based Applications, that accept critical information from users and store this information in databases.
زاهر الشامي +1 more
doaj
Reverse Proxy Framework using Sanitization Technique for Intrusion Prevention in Database
With the increasing importance of the internet in our day to day life, data security in web application has become very crucial. Ever increasing on line and real time transaction services have led to manifold rise in the problems associated with the ...
Chougule, Archana +2 more
core +1 more source
Augmented attack tree modeling of SQL injection attacks [PDF]
The SQL injection attacks (SQLIAs) vulnerability is extremely widespread and poses a serious security threat to web applications with built-in access to databases. The SQLIA adversary intelligently exploits the SQL statement parsing operation by web servers via specially constructed SQL statements that subtly lead to non-explicit executions or ...
Jie Wang +3 more
openaire +1 more source
Vulnerability anti-patterns:a timeless way to capture poor software practices (Vulnerabilities) [PDF]
There is a distinct communication gap between the software engineering and cybersecurity communities when it comes to addressing reoccurring security problems, known as vulnerabilities.
Coull, Natalie +3 more
core +2 more sources

