© 2019 IEEE. With the rapid growth in online services, hacking (alternatively attacking) on online database applications has become a grave concern now. Attacks on online database application are being frequently reported. Among these attacks, the SQL injection attack is at the top of the list. The hackers alter the SQL query sent by the user and inject malicious code therein. Hence, they access the database and manipulate the data. It is reported in the literature that the traditional SQL injection detection algorithms fail to prevent this type of attack. In this paper, we propose a machine learning based heuristic algorithm to prevent the SQL injection attack. We use a dataset of 616 SQL statements to train and test 23 different machine l...
Today, most of the web applications are associated with database at back-end so there are possibilit...
Over the years, technological advances have driven massive proliferation of web systems and business...
SQL injection attacks are a serious security threat to Web applications. They allow attackers to obt...
© 2019 IEEE. With the rapid growth in online services, hacking (alternatively attacking) on online d...
The increasing use of Information Technology applications in the distributed environment is increasi...
The concerns for the cyber security threats have increased drastically since the increase in the use...
SQL injections are a significant and ever-present threat to web applications and database security. ...
SQL injection is a cybercrime that attacks websites. This issue is still a challenging issue in the ...
In the current era, SQL Injection Attack is a serious threat to the security of the ongoing cyber wo...
There has been a significant increase in the number of cyberattacks. This is not only happening in I...
SQL Injection Attacks are extremely sober intrusion assaults on web based application since such typ...
SQL injection (SQLi), a well-known exploitation technique, is a serious risk factor for database-dri...
SQL Injection is one of the vulnerabilities in OWASP’s Top Ten List for Web Based Application Exploi...
SQL injection attacks are a common type of cyber-attack that exploit vulnerabilities in web applicat...
In this paper, we present a detailed review on various types of SQL injection attacks, vulnerabiliti...
Today, most of the web applications are associated with database at back-end so there are possibilit...
Over the years, technological advances have driven massive proliferation of web systems and business...
SQL injection attacks are a serious security threat to Web applications. They allow attackers to obt...
© 2019 IEEE. With the rapid growth in online services, hacking (alternatively attacking) on online d...
The increasing use of Information Technology applications in the distributed environment is increasi...
The concerns for the cyber security threats have increased drastically since the increase in the use...
SQL injections are a significant and ever-present threat to web applications and database security. ...
SQL injection is a cybercrime that attacks websites. This issue is still a challenging issue in the ...
In the current era, SQL Injection Attack is a serious threat to the security of the ongoing cyber wo...
There has been a significant increase in the number of cyberattacks. This is not only happening in I...
SQL Injection Attacks are extremely sober intrusion assaults on web based application since such typ...
SQL injection (SQLi), a well-known exploitation technique, is a serious risk factor for database-dri...
SQL Injection is one of the vulnerabilities in OWASP’s Top Ten List for Web Based Application Exploi...
SQL injection attacks are a common type of cyber-attack that exploit vulnerabilities in web applicat...
In this paper, we present a detailed review on various types of SQL injection attacks, vulnerabiliti...
Today, most of the web applications are associated with database at back-end so there are possibilit...
Over the years, technological advances have driven massive proliferation of web systems and business...
SQL injection attacks are a serious security threat to Web applications. They allow attackers to obt...