[EN] SQL injections rank in the OWASP Top 3. The literature shows that analyzing network datagrams allows for detecting or preventing such attacks. Unfortunately, such detection usually implies studying all packets flowing in a computer network. Therefore, routers in charge of routing significant traffic loads usually cannot apply the solutions proposed in the literature. This work demonstrates that detecting SQL injection attacks on flow data from lightweight protocols is possible. For this purpose, we gathered two datasets collecting flow data from several SQL injection attacks on the most popular database engines. After evaluating several machine learning-based algorithms, we get a detection rate of over 97% with a false alarm rate of le...
This study presents a multiagent architecture aimed at detecting SQL injection attacks, which are on...
SQL injection attacks [1] are one of the major security threats for web applications. In fact, the o...
SQL injection attacks are a common type of cyber-attack that exploit vulnerabilities in web applicat...
Introduction This datasets have SQL injection attacks (SLQIA) as malicious Netflow data. The attack...
The Internet of Things (IoT) presents a great many challenges in cybersecurity as the world grows mo...
The increasing use of Information Technology applications in the distributed environment is increasi...
Nowadays, more and more services are dependent on the use of resources hosted on the web. The realiz...
Structured Query Language injection (SQLi) attack is a code injection technique where hackers inject...
AbstractSQL Injection is a type of web application security vulnerability in which an attacker is ab...
Thousands of organisations store important and confidential information related to them, their custo...
This dataset has SQL injection attacks as malicious Netflow data. The attacks carried out are SQL in...
AbstractWith the rise of the Internet, web applications, such as online banking and web-based email,...
SQL injection (SQLi), a well-known exploitation technique, is a serious risk factor for database-dri...
Today, most of the web applications are associated with database at back-end so there are possibilit...
There has been a significant increase in the number of cyberattacks. This is not only happening in I...
This study presents a multiagent architecture aimed at detecting SQL injection attacks, which are on...
SQL injection attacks [1] are one of the major security threats for web applications. In fact, the o...
SQL injection attacks are a common type of cyber-attack that exploit vulnerabilities in web applicat...
Introduction This datasets have SQL injection attacks (SLQIA) as malicious Netflow data. The attack...
The Internet of Things (IoT) presents a great many challenges in cybersecurity as the world grows mo...
The increasing use of Information Technology applications in the distributed environment is increasi...
Nowadays, more and more services are dependent on the use of resources hosted on the web. The realiz...
Structured Query Language injection (SQLi) attack is a code injection technique where hackers inject...
AbstractSQL Injection is a type of web application security vulnerability in which an attacker is ab...
Thousands of organisations store important and confidential information related to them, their custo...
This dataset has SQL injection attacks as malicious Netflow data. The attacks carried out are SQL in...
AbstractWith the rise of the Internet, web applications, such as online banking and web-based email,...
SQL injection (SQLi), a well-known exploitation technique, is a serious risk factor for database-dri...
Today, most of the web applications are associated with database at back-end so there are possibilit...
There has been a significant increase in the number of cyberattacks. This is not only happening in I...
This study presents a multiagent architecture aimed at detecting SQL injection attacks, which are on...
SQL injection attacks [1] are one of the major security threats for web applications. In fact, the o...
SQL injection attacks are a common type of cyber-attack that exploit vulnerabilities in web applicat...