Results 21 to 30 of about 10,242 (187)

DeepSQLi: Deep Semantic Learning for Testing SQL Injection

open access: yes, 2020
Security is unarguably the most serious concern for Web applications, to which SQL injection (SQLi) attack is one of the most devastating attacks. Automatically testing SQLi vulnerabilities is of ultimate importance, yet is unfortunately far from trivial
Anna Huang Cheng-Zhi   +15 more
core   +1 more source

Ensemble Machine Learning Approaches for Detection of SQL Injection Attack

open access: yesTehnički Glasnik, 2021
In the current era, SQL Injection Attack is a serious threat to the security of the ongoing cyber world particularly for many web applications that reside over the internet. Many webpages accept the sensitive information (e.g.
Umar Farooq
doaj   +1 more source

Early Detection of SQL Injection Attacks

open access: yesInternational Journal of Network Security & Its Applications, 2013
SQL Injection (SQLI) is a common vulnerability found in web applications. The starting point of SQLI attack is the client-side (browser). If attack inputs can be detected early at the browse side, then it could be thwarted early by not forwarding the malicious inputs to the server-side for further processing.
Shahriar, Hossain   +2 more
openaire   +1 more source

SQLMVED: SQL injection runtime prevention system based on multi-variant execution

open access: yesTongxin xuebao, 2021
The effectiveness of combining SQL statement parsing with randomization to defend against SQL injection attack (SQLIA) was based on the fact that attackers did not know about the current method of randomization adopted by system.Therefore, once attackers
Bolin MA   +3 more
doaj   +2 more sources

Simulating SQL-Injection Cyber-Attacks Using GNS3 [PDF]

open access: yesInternational Journal of Computer Theory and Engineering, 2016
Network Forensics is a subtopic of Digital Forensics\ud wherein research on artificat investigations and intrusions evidence acquisition is addressed. Among many challenges in the field, the problem of losing data artifacts in the state of flux, (i.e., live volatile data), when network devices are suddenly non-operational remains a topic of interest to
Tobin, Patrick   +3 more
openaire   +1 more source

Penetration test method using blind SQL injection based on second-order fragment and reassembly

open access: yesTongxin xuebao, 2017
How to get rid of the blindness of current SQL injection penetration test,produce the optimized attack pattern of SQL injection,enhance the effectiveness in the phase of attack generation,and improve the accuracy of vulnerability detection of SQL ...
De-guang LE   +4 more
doaj   +2 more sources

Using Nlp Techniques To Detect Sql Injection Attack

open access: yesمجلة جامعة دمشق للعلوم الهندسية, 2023
Most of the applications used on the internet are Web-Based Applications, that accept critical information from users and store this information in databases.
زاهر الشامي   +1 more
doaj  

Reverse Proxy Framework using Sanitization Technique for Intrusion Prevention in Database

open access: yes, 2013
With the increasing importance of the internet in our day to day life, data security in web application has become very crucial. Ever increasing on line and real time transaction services have led to manifold rise in the problems associated with the ...
Chougule, Archana   +2 more
core   +1 more source

Augmented attack tree modeling of SQL injection attacks [PDF]

open access: yes2010 2nd IEEE International Conference on Information Management and Engineering, 2010
The SQL injection attacks (SQLIAs) vulnerability is extremely widespread and poses a serious security threat to web applications with built-in access to databases. The SQLIA adversary intelligently exploits the SQL statement parsing operation by web servers via specially constructed SQL statements that subtly lead to non-explicit executions or ...
Jie Wang   +3 more
openaire   +1 more source

Vulnerability anti-patterns:a timeless way to capture poor software practices (Vulnerabilities) [PDF]

open access: yes, 2018
There is a distinct communication gap between the software engineering and cybersecurity communities when it comes to addressing reoccurring security problems, known as vulnerabilities.
Coull, Natalie   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy