About 697,000 results
Open links in new tab
  1. Abstract— SQL injection attacks are a serious security risk as they have increased in frequency and severity over time. These attacks target an application's database layer explicitly. When user input into SQL statements is not sufficiently screened for string literal escape characters, a vulnerability occurs.

  2. Detecting Data Leaks via SQL Injection - Academia.edu

    The primary objective of this project is to develop a robust system to detect and prevent data leaks via SQL injection attacks on an E-Commerce platform. SQL injection is a common and severe security threat that can lead to unauthorized access to sensitive data, such as customer information and payment details.

  3. Schematic diagram of SQL injection attack - ResearchGate

    SQL injection is a malicious query-based attack that provide information in the URL parameter, which the statement consists of SQL malicious query for information retrieval. ... This research...

  4. applying ML to detect SQL injection attacks - GitHub

    This experiment is a research project about applying Machine Learning approaches to detect SQL Injection attacks. Below is a description about all notebooks and parts of this project: SQLIA_kaggle_Dataset.ipynb :

  5. Schematic diagram of SQL injection detection training process.

    In this study, we propose an architecture for detecting SQL injection attacks using a recurrent neural network autoencoder. The proposed architecture was trained on a publicly available...

  6. Demonstrates SQL injection attacks using malicious SQL queries and SQL ...

    SQL injection is a cybersecurity vulnerability where attackers input malicious SQL (Structured Query Language) code into a web application's input fields. If the application doesn't properly validate or sanitize the input, it can execute unintended database commands.

  7. Detecting Data Leaks Via SQL Injection Prevention - SSRN

    Mar 19, 2018 · The vulnerability is present when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and thereby unexpectedly executed. SQL Injection is one of the most common application layer attack techniques used today.

  8. malicious SQL statements. Detecting and preventing SQL injection is critical to safeguarding sensitive data from unauthorized access and leaks. This literature review examines various techniques and methodologies proposed for detecting data leaks through SQL injection. WAFs like ModSecurity provide a layer of defense by filtering and

  9. SQL injection attack happens often when an attacker tries to gain access to a database by inserting malicious inputs to the queries that change the logic, syntax or semantic of the legitimate query. There are many types of SQL injection attacks such as, using tautologies, alternate encodings, UNION, ORDER BY, HAVING.

  10. Detecting Data Leaks via Sql Injection Prevention on an E …

    The system uses SQL Injection mechanism prevention to keep the data safe and secure from sql injection attacks. The highlighted part here is encryption of card data using AES (Advanced Encryption Standard) technique.

Refresh