Results 1 to 10 of about 10,646 (208)

Review of SQL Injection : Problems and Prevention [PDF]

open access: yesJOIV: International Journal on Informatics Visualization, 2018
SQL injection happened in electronic records in database and it is still exist even after two decades since it first happened. Most of the web-based applications are still vulnerable to the SQL injection attacks.
Mohd Amin Mohd Yunus   +5 more
doaj   +5 more sources

Deep Learning Architecture for Detecting SQL Injection Attacks Based on RNN Autoencoder Model

open access: yesMathematics, 2023
SQL injection attacks are one of the most common types of attacks on Web applications. These attacks exploit vulnerabilities in an application’s database access mechanisms, allowing attackers to execute unauthorized SQL queries. In this study, we propose
Maha Alghawazi   +2 more
doaj   +3 more sources

Securing web applications against XSS and SQLi attacks using a novel deep learning approach [PDF]

open access: yesScientific Reports
Modern web application development involves handling enormous amounts of sensitive and consequential data. Security is, therefore, a crucial component of developing web applications. A web application's security is concerned with safeguarding the data it
Jaydeep R. Tadhani   +4 more
doaj   +2 more sources

SQL Injection Detection Using RNN Deep Learning Model

open access: yesJournal of Applied Engineering and Technological Science, 2023
SQL injection attacks are a common type of cyber-attack that exploit vulnerabilities in web applications to access databases through malicious SQL queries.
Abdulbasit ALAzzawi
doaj   +1 more source

AE-Net: Novel Autoencoder-Based Deep Features for SQL Injection Attack Detection

open access: yesIEEE Access, 2023
Structured Query Language (SQL) injection attacks represent a critical threat to database-driven applications and systems, exploiting vulnerabilities in input fields to inject malicious SQL code into database queries.
Nisrean Thalji   +4 more
doaj   +1 more source

Detection of SQL Injection Attack Using Machine Learning Techniques: A Systematic Literature Review

open access: yesJournal of Cybersecurity and Privacy, 2022
An SQL injection attack, usually occur when the attacker(s) modify, delete, read, and copy data from database servers and are among the most damaging of web application attacks.
Maha Alghawazi   +2 more
doaj   +1 more source

Web Application Penetration Testing Using SQL Injection Attack

open access: yesJOIV: International Journal on Informatics Visualization, 2021
A web application is a very important requirement in the information and digitalization era. With the increasing use of the internet and the growing number of web applications, every web application requires an adequate security level to store ...
Alde Alanda   +4 more
doaj   +1 more source

DETECTION OF SQL INJECTION VULNERABILITY IN CODEIGNITER FRAMEWORK USING STATIC ANALYSIS

open access: yesMultitek Indonesia, 2023
QL Injection attacks are still one type of attack that often occurs in web-based applications. The causes and ways to prevent SQL Injection have been widely explained in various sources.
Muhammad Fahmi Al Azhar, Ruki Harwahyu
doaj   +1 more source

Research on the SQL injection filtering based on SQL syntax tree

open access: yes网络与信息安全学报, 2016
The development of Web application make its areas become more and more widely.Followed by a security problem is becoming more and more serious,especially for the SQL injection attacks,which bring a huge challenge to the Web application security.A new SQL
Chen-wang HAN, Hui LIN, Chuan HUANG
doaj   +3 more sources

SSQLi: A Black-Box Adversarial Attack Method for SQL Injection Based on Reinforcement Learning

open access: yesFuture Internet, 2023
SQL injection is a highly detrimental web attack technique that can result in significant data leakage and compromise system integrity. To counteract the harm caused by such attacks, researchers have devoted much attention to the examination of SQL ...
Yuting Guan   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy