Results 31 to 40 of about 10,242 (187)

A novel technique to prevent SQL injection and cross-site scripting attacks using Knuth-Morris-Pratt string match algorithm

open access: yesEURASIP Journal on Information Security, 2020
Structured Query Language (SQL) injection and cross-site scripting remain a major threat to data-driven web applications. Instances where hackers obtain unrestricted access to back-end database of web applications so as to steal, edit, and destroy ...
Oluwakemi Christiana Abikoye   +4 more
doaj   +1 more source

AE-Net: Novel Autoencoder-Based Deep Features for SQL Injection Attack Detection

open access: yesIEEE Access, 2023
Structured Query Language (SQL) injection attacks represent a critical threat to database-driven applications and systems, exploiting vulnerabilities in input fields to inject malicious SQL code into database queries.
Nisrean Thalji   +4 more
doaj   +1 more source

SIDNet: A SQL Injection Detection Network for Enhancing Cybersecurity

open access: yesIEEE Access
SQL (Structured Query Language) injection is one of the most prevalent and dangerous forms of cyber-attacks, posing significant threats to database management systems and the overall security of web applications.
Debendra Muduli   +6 more
doaj   +1 more source

Cloud Based Secure Web Application [PDF]

open access: yesEngineering and Technology Journal, 2015
The types of web attack continue to appear and add their impacts on web application security, SQL injection, and XSS is one type of these attack, that causes extremely high risk for web application through stolen critical information or broken web ...
Saad K. Majeed   +2 more
doaj   +1 more source

Deep-Learning Based Injection Attacks Detection Method for HTTP

open access: yesMathematics, 2022
In the context of the new era of high digitization and informatization, the emergence of the internet and artificial intelligence technologies has profoundly changed people’s lifestyles. The traditional cyber attack detection has become increasingly weak
Chunhui Zhao   +4 more
doaj   +1 more source

Some security issues for web based frameworks [PDF]

open access: yes, 2010
This report investigates whether a vulnerability found in one web framework may be used to find a vulnerability in a different web framework. To test this hypothesis, several open source applications were installed in a secure test environment together ...
Ellman, Jeremy, Roberts-Morpeth, P.
core   +1 more source

Research on SQL injection detection technology based on SVM

open access: yesMATEC Web of Conferences, 2018
SQL injection, which has the characteristics of great harm and fast variation, has always ranked the top of the OWASP TOP 10, which has always been a hot spot in the research of web security.
Chen Zhuang, Guo Min, zhou Lin
doaj   +1 more source

Empowering Software Engineers to Design More Secure Web Applications: Guidelines and Potential of Using LLMs as a Recommender Tool

open access: yesJournal of Software: Evolution and Process, Volume 38, Issue 2, February 2026.
ABSTRACT As software applications get increasingly connected and complex, cybersecurity becomes more and more important to consider during development and evaluation. Software engineers need to be aware of various security threats and the countermeasures that can be taken to mitigate them.
Raffaela Groner   +5 more
wiley   +1 more source

SQLi‐ScanEval: A Framework for Design and Evaluation of SQLi Detection Using Vulnerability and Penetration Testing Scanners

open access: yesEngineering Reports, Volume 8, Issue 1, January 2026.
This paper proposes SQLi‐ScanEval Framework, a standardized SQLi detection system that integrates vulnerability and penetration testing scanners into a standardized framework. It tested seven prominent SQLi vulnerability scanners including OWASP ZAP, Wapiti, Vega, Acunetix, Invicti, Burp Suite, and Arachni on two prominent vulnerable testing ...
Hajira Bashir   +6 more
wiley   +1 more source

Approach to detecting SQL injection behaviors in network environment

open access: yesTongxin xuebao, 2016
SQL injection attack is one of the main threats that many Web applications faced with. The traditional detection method depended on the clients or servers.
Yu-fei ZHAO   +3 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy