Results 91 to 100 of about 10,646 (208)

Teaching Security Defense Through Web-Based Hacking at the Undergraduate Level

open access: yes, 2017
The attack surface for hackers and attackers is growing every day. Future cybersecurity professionals must have the knowledge and the skills to defend against these cyber attacks.
Wilson, Brent
core  

The Importance of Developing Preventive Techniques for SQL Injection Attacks

open access: yesTehnički Glasnik, 2022
Many intentionally vulnerable web applications are circulating on the Internet that serve as a legal test ground for practicing SQL injection attacks. For demonstration purposes the attacks will target an Acunetix test web application created using PHP ...
Nenad Bedeković   +3 more
doaj  

Assessment of the web application security effectiveness against various methods of network attacks

open access: yesJournal of Computer Sciences Institute, 2018
The article discusses the issue of the security of Internet applications. The most popular types of attacks and methods of securing web applications against them are discussed. The study conducted the effectiveness of security of web applications.
Mateusz Erbel, Piotr Kopniak
doaj   +1 more source

A Systematic Literature Review on SQL Injection Attacks

open access: yesNUML International Journal of Engineering and Computing
With the increasing use of web applications, concerns for data integrity and security have increased manifolds in the current time. The growth in quantity of internet clients and sites has made the web security circumstances progressively extreme ...
Maryam Mehmood, Asad Ijaz
doaj   +1 more source

Detection of SQL injection attacks

open access: yes, 2023
Web applications that employ SQL datasets are at serious risk from SQL injection attacks. Using two separate datasets, this study examined the utility of ML classification approaches for identifying SQL injection threats. On two datasets—one taken from the actual world and the other created artificially—random forest (RF), descion tree (DT), k-nearest ...
openaire   +1 more source

Detection of the Security Vulnerabilities in Web Applications [PDF]

open access: yes
The contemporary organizations develop business processes in a very complex environment. The IT&C technologies are used by organizations to improve their competitive advantages. But, the IT&C technologies are not perfect.
Marius POPA
core  

Comparative Analysis of SQL Injection Defense Mechanisms Based on Three Approaches: PDO, PVT, and ART

open access: yesApplied Sciences
This study presents a comprehensive examination of the risks associated with SQL Injection attacks, with a particular focus on the Union Select technique.
Jiho Choi, Young-Ae Jung, Hoon Ko
doaj   +1 more source

INFO2009 - Team 'DROP TABLE groups; [PDF]

open access: yes
Edshare for INFO2009 coursework 2 - Team 'DROP TABLE ...
Bull, Samuel   +5 more
core  

Deep Learning in Cybersecurity: A Hybrid BERT–LSTM Network for SQL Injection Attack Detection

open access: yesIET Information Security
In the past decade, cybersecurity has become increasingly significant, driven largely by the increase in cybersecurity threats. Among these threats, SQL injection attacks stand out as a particularly common method of cyber attack.
Yixian Liu, Yupeng Dai
doaj   +1 more source

SQL Injection Detection Based on Lightweight Multi-Head Self-Attention

open access: yesApplied Sciences
This paper presents a novel neural network model for the detection of Structured Query Language (SQL) injection attacks for web applications. The model features high detection accuracy, fast inference speed, and low weight size.
Rui-Teng Lo   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy