[PDF][PDF] Cyber security: performance analysis and challenges for cyber attacks detection

AA Salih, MB Abdulrazzaq - Indonesian Journal of Electrical …, 2023 - academia.edu
Nowadays, with the occurrence of new attacks and raised challenges have been facing the
security of computer systems. Cyber security techniques have become essential for …

Beyond the Basics: A Study of Advanced Techniques for Detecting and Preventing SQL Injection Attacks

A Goyal, P Matta - 2023 4th International Conference on Smart …, 2023 - ieeexplore.ieee.org
Attacks using SQL (Structured Query Language) injection pose a serious risk to the
confidentiality and integrity of databases and web applications. Although tried-and-true …

SQL injection and its detection using machine learning algorithms and BERT

S Lodha, A Gundawar - … Conference on Cognitive Computing and Cyber …, 2022 - Springer
SQL Injection attacks target the database of applications to extract private information or
inject malicious code. In this paper, we attempt to present a well-researched and practiced …

Improving Detection of SQL Injection Attack by SMOTE

P Sri-thong, C Bunkhumpornpat - 2023 27th International …, 2023 - ieeexplore.ieee.org
This paper proposes competitive efficiency study and methods for detecting SQL injection by
using rule base and machine learning. Rule-base employs the black-list word technique …

Optus data breach australia year 2022–case study

PG Shah - Australian Journal of Wireless Technologies, Mobility …, 2022 - ausjournal.com
Abstract In September 2022, Optus Australia was shaken by cyber-attack which resulted in
the disclosure of customer's valuable personal data and information. This case study will …

Securely extending and running low-code applications with C

L Brüggemann - arXiv preprint arXiv:2307.06340, 2023 - arxiv.org
Low-code development platforms provide an accessible infrastructure for the creation of
software by domain experts, also called" citizen developers", without the need for formal …

WebAppShield: an approach exploiting machine learning to detect SQLi attacks in an application layer in run-time

AA Ashlam, A Badii, F Stahl - International Journal of …, 2022 - centaur.reading.ac.uk
In recent years, SQL injection attacks have been identified as being prevalent against web
applications. They affect network security and user data, which leads to a considerable loss …

Evaluation of Web Application Vulnerability Scanners using SQL Injection Attacks

RY Ibrahim, MM Rosli - 2023 IEEE 8th International …, 2023 - ieeexplore.ieee.org
With the evolution of web technologies, many businesses have decided to attract more
clients through the online market, also called e-commerce. While numerous web …

Fortifying Database Security: Integrating Advanced Honeypot Technology for Resilient SQL Injection Defense

U Kumaran, T Swetha, GSNS Reddy… - 2024 International …, 2024 - ieeexplore.ieee.org
The dynamic nature of cyber threats necessitates the development of novel approaches to
strengthen database system security. The novel method for fortifying defenses against SQL …

Secure software immune receptors from SQL injection and cross site scripting attacks in content delivery network web applications

N Ravishankar, MB Raju… - 2021 9th International …, 2021 - ieeexplore.ieee.org
In our proposed work the web security has been enhanced using additional security code
and an enhanced frame work. Administrator of site is required to specify the security code for …