A SQL injection detection method based on adaptive deep forest

Q Li, W Li, J Wang, M Cheng - IEEE Access, 2019 - ieeexplore.ieee.org
Injection attack is the first of the top 10 security threats announced by the OWASP.
Meanwhile, SQL injection is one of the most important types among the injection attacks …

A detection and prevention technique on sql injection attacks

ZCSS Hlaing, M Khaing - 2020 IEEE Conference on Computer …, 2020 - ieeexplore.ieee.org
With the web advancements are rapidly developing, the greater part of individuals makes
their transactions on web, for example, searching through data, banking, shopping …

Detection and prevention of SQLI attacks and developing compressive framework using machine learning and hybrid techniques

WB Demilie, FG Deriba - Journal of Big Data, 2022 - Springer
A web application is a software system that provides an interface to its users through a web
browser on any operating system (OS). Despite their growing popularity, web application …

[PDF][PDF] Development of a compressive framework using machine learning approaches for SQL injection attacks

FG Deriba, AO Salau, SH Mohammed… - Przeglad …, 2022 - pe.org.pl
Web applications play an important role in our daily lives. Various Web applications are
used to carry out billions of online transactions. Because of their widespread use, these …

Raspberry Pi based intrusion detection system using k-means clustering algorithm

R Sumanth, KN Bhanu - 2020 Second International …, 2020 - ieeexplore.ieee.org
Safety has become a growing concern in this rapidly evolving environment of worldwide
data sharing, inexpensive Web access and fast-paced technological growth. The protection …

A novel web attack detection mechanism using maximal-munch with torrent deep network

S Pillai, V Verma - IEEE Transactions on Cloud Computing, 2023 - ieeexplore.ieee.org
A web attack is a harmful and deliberate attempt made by one person or group to gain
access to another person's or group's data collection. Due to the incompatibility of the …

Organization security framework—a defensive mechanism

SB Kumar, K Rajeev, S Dileep, AM Ashraf… - Proceedings of Third …, 2023 - Springer
Security is one of the greatest priorities for any organization cementing their presence in the
digital world. In a world where technology advances at a phenomenal rate securing data is …

SECURE-D: Framework For Detecting and Preventing Attacks in SQL and NoSQL Databases

VO Jithin, N Subramanian - 2022 10th International Symposium …, 2022 - ieeexplore.ieee.org
The advancements in internet technology have attracted more users for web applications
over recent years. Users' confidential data are stored in databases thus heightening the …

Fortifying Information Security: Security Implications of Microservice and Monolithic Architectures

S Nemmini, S Abhishek, T Anjali… - 2023 16th International …, 2023 - ieeexplore.ieee.org
Monolithic architecture is a traditional and primary method for creating software programs.
On the other hand, monolithic architecture's shortcomings were addressed by developing …

Statistical Analysis of threatening IP in Universities Based Automated Script

Z Chen, M Zhou, L Feng, B Li - … of the 2022 2nd International Conference …, 2022 - dl.acm.org
The operation of cyber security has gradually become a significant part of informatization in
the process of smart campus construction. However, universities rely too much on physical …