Detection of sql injection attack using machine learning techniques: a systematic literature review
An SQL injection attack, usually occur when the attacker (s) modify, delete, read, and copy
data from database servers and are among the most damaging of web application attacks. A …
data from database servers and are among the most damaging of web application attacks. A …
A Survey on Cyber–Physical Systems Security
Cyber–physical systems (CPSs) are new types of intelligent systems that integrate
computing, control, and communication technologies, bridging the cyberspace and physical …
computing, control, and communication technologies, bridging the cyberspace and physical …
[HTML][HTML] SQL injection attack detection in network flow data
IS Crespo-Martínez, A Campazas-Vega… - Computers & …, 2023 - Elsevier
SQL injections rank in the OWASP Top 3. The literature shows that analyzing network
datagrams allows for detecting or preventing such attacks. Unfortunately, such detection …
datagrams allows for detecting or preventing such attacks. Unfortunately, such detection …
An investigation into the performances of the state-of-the-art machine learning approaches for various cyber-attack detection: A survey
In this research, we analyzed the suitability of each of the current state-of-the-art machine
learning models for various cyberattack detection from the past 5 years with a major …
learning models for various cyberattack detection from the past 5 years with a major …
[HTML][HTML] Simulating SQL injection vulnerability exploitation using Q-learning reinforcement learning agents
In this paper, we propose a formalization of the process of exploitation of SQL injection
vulnerabilities. We consider a simplification of the dynamics of SQL injection attacks by …
vulnerabilities. We consider a simplification of the dynamics of SQL injection attacks by …
SQL injection attack detection by machine learning classifier
SQL Injection is one of the top 10 vulnerabilities in web-based systems. This attack
essentially penetrates the logical section of the database. If the database has a logical flaw …
essentially penetrates the logical section of the database. If the database has a logical flaw …
Semantic query-featured ensemble learning model for SQL-injection attack detection in IoT-ecosystems
M Gowtham, HB Pramod - IEEE Transactions on Reliability, 2021 - ieeexplore.ieee.org
Structured query language (SQL) has emerged as one of the most used databases, serving
an array of Internet-of-Things (IoTs)-enabled services including web-transactions, grid …
an array of Internet-of-Things (IoTs)-enabled services including web-transactions, grid …
Detection and prevention of SQLI attacks and develo** compressive framework using machine learning and hybrid techniques
A web application is a software system that provides an interface to its users through a web
browser on any operating system (OS). Despite their growing popularity, web application …
browser on any operating system (OS). Despite their growing popularity, web application …
Intelligent detection and recovery from cyberattacks for small and medium-sized enterprises
MÁ López, JML Enríquez, M López, CMA Jiménez… - IJIMAI, 2020 - dialnet.unirioja.es
Cyberattacks threaten continuously computer security in companies. These attacks evolve
everyday, being more and more sophisticated and robust. In addition, they take advantage …
everyday, being more and more sophisticated and robust. In addition, they take advantage …
PROGESI: a PROxy Grammar to Enhance web application firewall for SQL Injection prevention
A web application is prone to security threats due to its open nature. The security of these
platforms is imperative for organizations of all sizes because they store sensitive information …
platforms is imperative for organizations of all sizes because they store sensitive information …