Application of machine learning and artificial intelligence in detecting SQL injection attacks
More recently, cyber-attacks have also been on the rise and SQL injection attacks are some of major threats to data security. AI and machine learning have come a long way, however their usage in cybersecurity is still somewhat nascent. The main aim of this work is focusing on solving the IT-related...
| Main Authors: | Md Sultan, Abu Bakar, Agiliga, Nwabudike Augustine, Osman, Mohd Hafeez Bin, Sharif, Khaironi Yatim |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Indonesian Society for Knowledge and Human Development
2024
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/118126/ http://psasir.upm.edu.my/id/eprint/118126/1/118126.pdf |
Similar Items
Detection of SQL injection attack using machine learning
by: Tung, Tean Thong
Published: (2024)
by: Tung, Tean Thong
Published: (2024)
SQL Injection attack roadmap and fusion
by: Umar, Kabir, et al.
Published: (2016)
by: Umar, Kabir, et al.
Published: (2016)
Systematic literature review on SQL injection attack
by: Aminu, Lawal Muhammad, et al.
Published: (2016)
by: Aminu, Lawal Muhammad, et al.
Published: (2016)
A Survey on SQL injection: vulnerabilities, attacks, and prevention techniques
by: Kindy, Diallo Abdoulaye, et al.
Published: (2011)
by: Kindy, Diallo Abdoulaye, et al.
Published: (2011)
Comparison of security testing approaches for detection of SQL injection vulnerabilities
by: Mohammed Draib, Najla’a Ateeq, et al.
Published: (2018)
by: Mohammed Draib, Najla’a Ateeq, et al.
Published: (2018)
Prevention of attack on Islamic websites by fixing SQL injection vulnerabilities using co-evolutionary search approach
by: Umar, Kabir, et al.
Published: (2014)
by: Umar, Kabir, et al.
Published: (2014)
A walk through SQL injection: vulnerabilities, attacks, and countermeasures in current and future networks
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
A detailed survey on various aspects of SQL Injection: vulnerabilities, innovative attacks, and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011)
Penetration testing using Kali Linux: SQL injection, XSS, Wordpress, and WPA2 attacks
by: Gunawan, Teddy Surya, et al.
Published: (2018)
by: Gunawan, Teddy Surya, et al.
Published: (2018)
SQL injection penetration testing tutorial
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
Review of SQL injection : problems and prevention
by: Mohd Yunus, Mohd Amin, et al.
Published: (2018)
by: Mohd Yunus, Mohd Amin, et al.
Published: (2018)
A detailed survey on various aspects of SQL injection in web applications: vulnerabilities, innovative attacks and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
Enhanced pushdown automaton based static analysis for detection of SQL injection Hotspots in web application
by: Umar, Kabir, et al.
Published: (2016)
by: Umar, Kabir, et al.
Published: (2016)
Spear-phishing attack detection using artificial intelligence
by: Rajkumaradevan, Sanglidevan
Published: (2024)
by: Rajkumaradevan, Sanglidevan
Published: (2024)
Comparing web vulnerability scanners with a new method for SQL injection vulnerabilities detection and removal EPSQLiFix
by: Md Sultan, Abu Bakar, et al.
Published: (2018)
by: Md Sultan, Abu Bakar, et al.
Published: (2018)
Taxonomy of SQL Injection: ML Trends & Open Challenges
by: Abobakr Busaeed, Raed Abdullah, et al.
Published: (2023)
by: Abobakr Busaeed, Raed Abdullah, et al.
Published: (2023)
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
Lethality of SQL injection against current and future Internet-technologies
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
Restaurant O SIX JOINT online ordering system with anti-SQL injection
by: Tang, Jie Yi, et al.
Published: (2021)
by: Tang, Jie Yi, et al.
Published: (2021)
LogiQL and SQL
by: Halpin, Terry, et al.
Published: (2015)
by: Halpin, Terry, et al.
Published: (2015)
Artificial intelligence techniques for implementation of intelligent machining
by: Abdul Wahab Hashmi, Hashmi, et al.
Published: (2022)
by: Abdul Wahab Hashmi, Hashmi, et al.
Published: (2022)
Effectiveness of structured query language injection attacks detection mechanisms
by: Mohamad, Nurul Zawiyah
Published: (2008)
by: Mohamad, Nurul Zawiyah
Published: (2008)
Application of Artificial Neural Network in Detection of DOS Attacks
by: Ahmad, iftikhar, et al.
Published: (2009)
by: Ahmad, iftikhar, et al.
Published: (2009)
Application of Artificial Neural Network in Detection of Probing Attacks
by: I., Ahmad, et al.
Published: (2010)
by: I., Ahmad, et al.
Published: (2010)
Application of Artificial Neural Network in Detection of Probing Attacks
by: Ahmad, iftikhar, et al.
Published: (2009)
by: Ahmad, iftikhar, et al.
Published: (2009)
An intelligence technique for denial of service (DoS) attack detection
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2018)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2018)
An Intelligence Technique For Denial Of Service (Dos) Attack Detection
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
Machine learning and deep learning approaches for detecting DDoS attacks in cloud environments
by: Khan, Muhammad Asif, et al.
Published: (2025)
by: Khan, Muhammad Asif, et al.
Published: (2025)
Phishing attack detection using machine learning method
by: Jupin, John Arthur
Published: (2019)
by: Jupin, John Arthur
Published: (2019)
Exploring artificial intelligence(AI) for machine automation
by: Meow, Mervyn Zi Yang
Published: (2019)
by: Meow, Mervyn Zi Yang
Published: (2019)
Artificial Intelligent Model to Predict Surface Roughness in Laser Machining
by: M. M., Noor, et al.
Published: (2009)
by: M. M., Noor, et al.
Published: (2009)
Device and corresponding method for selecting machinability data with artificial intelligence machinability
by: Wong, Shaw Voon
Published: (2003)
by: Wong, Shaw Voon
Published: (2003)
Artificial intelligence and edge computing for machine maintenance-review
by: Bala, Abubakar, et al.
Published: (2024)
by: Bala, Abubakar, et al.
Published: (2024)
Artificial Intelligence Techniques for Machining Performance: a Review
by: M. M., Rahman, et al.
Published: (2010)
by: M. M., Rahman, et al.
Published: (2010)
Performance comparison between NoSQL (RethinkDB) and MySQL database replication from master to slave in big data
by: Dildar Hussain,, et al.
Published: (2021)
by: Dildar Hussain,, et al.
Published: (2021)
Detecting resource consumption attack over MANET using an artificial immune algorithm
by: Abdelhaq, Maha, et al.
Published: (2011)
by: Abdelhaq, Maha, et al.
Published: (2011)
Comparative performance of machine learning methods for classification on phishing attack detection
by: Siti Noranisah, Wan Ahmad, et al.
Published: (2020)
by: Siti Noranisah, Wan Ahmad, et al.
Published: (2020)
Artificial intelligence for cloud-assisted object detection
by: Chan, Wen Jie
Published: (2023)
by: Chan, Wen Jie
Published: (2023)
Verification the performance of Microsoft SQL Server / Nageswary Gannapathy
by: Nageswary , Gannapathy
Published: (2002)
by: Nageswary , Gannapathy
Published: (2002)
Machine learning: tasks, modern day applications and challenges
by: Aljuaid, Lamyaa Zaed, et al.
Published: (2019)
by: Aljuaid, Lamyaa Zaed, et al.
Published: (2019)
Similar Items
-
Detection of SQL injection attack using machine learning
by: Tung, Tean Thong
Published: (2024) -
SQL Injection attack roadmap and fusion
by: Umar, Kabir, et al.
Published: (2016) -
Systematic literature review on SQL injection attack
by: Aminu, Lawal Muhammad, et al.
Published: (2016) -
A Survey on SQL injection: vulnerabilities, attacks, and prevention techniques
by: Kindy, Diallo Abdoulaye, et al.
Published: (2011) -
Comparison of security testing approaches for detection of SQL injection vulnerabilities
by: Mohammed Draib, Najla’a Ateeq, et al.
Published: (2018)