DIAVA: a traffic-based framework for detection of SQL injection attacks and vulnerability analysis of leaked data

H Gu, J Zhang, T Liu, M Hu, J Zhou… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
… popularity of automated penetration tools in hacking web ap… To figure out the successful
SQL injection attacks as well as … can accurately detect the SQL injection attacks and report their …

[PDF][PDF] SQL Injection Attack: Detection and Prevention

S Charania, V Vyas - Int. Res. J. Eng. Technol, 2016 - academia.edu
SQL Injections have been long studied and various tools have been proposed, each having
their share of limitations. Penetration attacks have been prevalent in the web based domain, …

[PDF][PDF] SQL Injection Attack Scanner Using Boyer-Moore String Matching Algorithm.

TFA Rahman, AG Buja, K Abd, FM Ali - J. Comput., 2017 - jcomputers.us
… is one of the vulnerabilities of web applications, which makes use of the user input field in
a web application to create the SQL statement used to penetrate the back-end database. This …

SQL injection attack detection using ResNet

S Nagasundari, PB Honnavali - 2019 10th International …, 2019 - ieeexplore.ieee.org
… of training, resulting in automatic detection of attacks. it does not only improve detection …
which uses CNN to detect the SQL Injection attacks. This method automatically extracts features …

Prevention of SQL injection attack by using black box testing

BM Thombare, DR Soni - … of the 23rd International Conference on …, 2022 - dl.acm.org
… of SQL Injection Vulnerability to eradicate SQL injection attacks. The SQLIV is automatically
assessed when such attacks … method for the attack and carried out penetration testing. This …

Method for simulating SQL injection and DOS attack

K Rohini, K Kasturi, R Vignesh - … on Data Science: Proceedings of ICTIDS …, 2020 - Springer
… Cybercriminals continue to concentrate their attempts on penetrating critical public infrastructure
systems such as energy grids, nuclear facilities, transport networks, economic stability, …

[图书][B] Mastering modern Web penetration testing

P Prasad - 2016 - books.google.com
SQL Injection, doesn't need any introduction at all. This chapter makes use of SQLMap and
explores it to detect and exploit SQL injection … other attack techniques such as SQL injections. …

Testing of network security systems through DoS, SQL injection, reverse TCP and social engineering attacks

A Maraj, E Rogova, G Jakupi - International Journal of Grid …, 2020 - inderscienceonline.com
attacks by testing security systems before attacks happen. The most frequent types of attacks
are: SQL injection… In this paper, we use penetration testing techniques on computer systems

Detection of SQL injection based on artificial neural network

P Tang, W Qiu, Z Huang, H Lian, G Liu - Knowledge-Based Systems, 2020 - Elsevier
SQL injection attacks will not stop in a short period of time, and … application attack defense
strategy including SQL injection attacks … scanner that used penetration testing and combinative …

[HTML][HTML] Simulating SQL injection vulnerability exploitation using Q-learning reinforcement learning agents

L Erdődi, ÅÅ Sommervoll, FM Zennaro - Journal of Information Security and …, 2021 - Elsevier
… of SQL injection vulnerabilities. We consider a simplification of the dynamics of SQL injection
attacks by … of a penetration tester performing legitimate attacks in order to uncover possible …