Detection of SQL injection attack using machine learning
The rapid proliferation of online services has led to a significant increase in the utilisation of the internet. User data is considered the most precious asset of the firm; nonetheless, databases are susceptible to many assaults and dangers. SQL injection (SQLI) refers to a specific type of securit...
| Main Author: | Tung, Tean Thong |
|---|---|
| Format: | Final Year Project / Dissertation / Thesis |
| Published: |
2024
|
| Subjects: | |
| Online Access: | http://eprints.utar.edu.my/6685/ http://eprints.utar.edu.my/6685/1/fyp_CS_2024_TTT.pdf |
Similar Items
Application of machine learning and artificial intelligence in detecting SQL injection attacks
by: Md Sultan, Abu Bakar, et al.
Published: (2024)
by: Md Sultan, Abu Bakar, et al.
Published: (2024)
Spear-phishing attack detection using artificial intelligence
by: Rajkumaradevan, Sanglidevan
Published: (2024)
by: Rajkumaradevan, Sanglidevan
Published: (2024)
Detecting malware attack in mobile phone using Intrusion Detection and Prevention System (IDPS)
by: Leow, Yu Hong
Published: (2024)
by: Leow, Yu Hong
Published: (2024)
SQL Injection attack roadmap and fusion
by: Umar, Kabir, et al.
Published: (2016)
by: Umar, Kabir, et al.
Published: (2016)
Detection and prevention schemes for ddos, arp
spoofing, and ip fragmentation attacks in smart factory
by: Chai, Tze Uei
Published: (2023)
by: Chai, Tze Uei
Published: (2023)
Systematic literature review on SQL injection attack
by: Aminu, Lawal Muhammad, et al.
Published: (2016)
by: Aminu, Lawal Muhammad, et al.
Published: (2016)
Predicting and Analyzing Water Quality using Machine Learning: A Comprehensive Model
by: Khan, Yafra, et al.
Published: (2016)
by: Khan, Yafra, et al.
Published: (2016)
Sales forecasting in the fashion retail industry using machine learning techniques
by: Beh, Chi Qian
Published: (2024)
by: Beh, Chi Qian
Published: (2024)
Vehicle Detection in Deep Learning
by: Teoh, Per Nian
Published: (2019)
by: Teoh, Per Nian
Published: (2019)
A Survey on SQL injection: vulnerabilities, attacks, and prevention techniques
by: Kindy, Diallo Abdoulaye, et al.
Published: (2011)
by: Kindy, Diallo Abdoulaye, et al.
Published: (2011)
Forecasting road deaths in Malaysia using support vector machine
by: Nurul Qastalani, Radzuan, et al.
Published: (2020)
by: Nurul Qastalani, Radzuan, et al.
Published: (2020)
Evaluation of the sanitary sewerage system flow design in Kuantan city
by: Yap, Hiew Thong
Published: (2018)
by: Yap, Hiew Thong
Published: (2018)
SQL injection penetration testing tutorial
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
Psychological impact of noise exposure among machine operators and non-machine operators in construction sites in Perak, Malaysia
by: Kee, Heng Yik
Published: (2019)
by: Kee, Heng Yik
Published: (2019)
Penetration testing using Kali Linux: SQL injection, XSS, Wordpress, and WPA2 attacks
by: Gunawan, Teddy Surya, et al.
Published: (2018)
by: Gunawan, Teddy Surya, et al.
Published: (2018)
IOT threats detection using few shots learning
by: Chua, Cheng Han
Published: (2024)
by: Chua, Cheng Han
Published: (2024)
Underwater species-constrained fish detection using multi-frame image information
by: Ling, Yi Jun
Published: (2023)
by: Ling, Yi Jun
Published: (2023)
Detection of microplastic in tap water, Kampar, Perak
by: Fong, Rui Qian
Published: (2022)
by: Fong, Rui Qian
Published: (2022)
Rogue access point detection and tracking in UTAR campus
by: Lee, Chiew Min
Published: (2024)
by: Lee, Chiew Min
Published: (2024)
The innovation of cotton fiber from recycled cloth as coloring agent for polypropylene via injection moulding
by: Main, Nor Mazlana, et al.
Published: (2020)
by: Main, Nor Mazlana, et al.
Published: (2020)
A walk through SQL injection: vulnerabilities, attacks, and countermeasures in current and future networks
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
A detailed survey on various aspects of SQL Injection: vulnerabilities, innovative attacks, and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011)
Covid-19 management strategies for higher learning institute: A case study in Universiti Malaya / Hazren Mohd
by: Hazren , Mohd
Published: (2022)
by: Hazren , Mohd
Published: (2022)
Taxonomy of SQL Injection: ML Trends & Open Challenges
by: Abobakr Busaeed, Raed Abdullah, et al.
Published: (2023)
by: Abobakr Busaeed, Raed Abdullah, et al.
Published: (2023)
Deep learning for environmentally robust speech recognition
by: Alhamada, A. I., et al.
Published: (2020)
by: Alhamada, A. I., et al.
Published: (2020)
Metaldehyde: a brief on biodegradation and detection methods / Azlina Mat Saad
by: Mat Saad, Azlina, et al.
Published: (2018)
by: Mat Saad, Azlina, et al.
Published: (2018)
Leachate treatment through Fenton reaction-aided-chemical treatment
by: Thong, Hui Shan
Published: (2022)
by: Thong, Hui Shan
Published: (2022)
Campus study buddy: Collaborative learning and resource sharing app
by: Huang, Yifan
Published: (2024)
by: Huang, Yifan
Published: (2024)
Bioremediation of cadmium using microbe
by: Nor Hidawati, Elias
Published: (2008)
by: Nor Hidawati, Elias
Published: (2008)
Removal of copper using seaweed
by: Nur Syazwani, Mohd Khir
Published: (2019)
by: Nur Syazwani, Mohd Khir
Published: (2019)
Development of augmented reality application as a learning tool in biology education
by: Yong, Mei Ting
Published: (2024)
by: Yong, Mei Ting
Published: (2024)
Biomethanation of sewage sludge by using ultrasonic membrane anaerobic system (UMAS) using sewage sludge as substrate
by: Nur Sarafina, Samsudin
Published: (2015)
by: Nur Sarafina, Samsudin
Published: (2015)
Adsorption of zinc using rubber seeds
by: Daud, M.H., et al.
Published: (2008)
by: Daud, M.H., et al.
Published: (2008)
Manganese removal using natural microflora
by: Mohd Kamarul Syahid, Salleh
Published: (2009)
by: Mohd Kamarul Syahid, Salleh
Published: (2009)
Removal of nickel by using microflora in drain
by: Norasiha, Hamid
Published: (2008)
by: Norasiha, Hamid
Published: (2008)
An auto sorting waste detection service system for green society
by: Ahda, Sabrina Washiatul, et al.
Published: (2017)
by: Ahda, Sabrina Washiatul, et al.
Published: (2017)
Prevention of attack on Islamic websites by fixing SQL injection vulnerabilities using co-evolutionary search approach
by: Umar, Kabir, et al.
Published: (2014)
by: Umar, Kabir, et al.
Published: (2014)
Thickening of municipal sludge using recycled coagulant
by: Hamid, A.H.A., et al.
Published: (2008)
by: Hamid, A.H.A., et al.
Published: (2008)
Water treatment using slow sand filter
by: Aimi Fadlini, Fauzi
Published: (2010)
by: Aimi Fadlini, Fauzi
Published: (2010)
Elucidation of blended cement using industrial waste
by: Doh, Shu Ing
by: Doh, Shu Ing
Similar Items
-
Application of machine learning and artificial intelligence in detecting SQL injection attacks
by: Md Sultan, Abu Bakar, et al.
Published: (2024) -
Spear-phishing attack detection using artificial intelligence
by: Rajkumaradevan, Sanglidevan
Published: (2024) -
Detecting malware attack in mobile phone using Intrusion Detection and Prevention System (IDPS)
by: Leow, Yu Hong
Published: (2024) -
SQL Injection attack roadmap and fusion
by: Umar, Kabir, et al.
Published: (2016) -
Detection and prevention schemes for ddos, arp
spoofing, and ip fragmentation attacks in smart factory
by: Chai, Tze Uei
Published: (2023)