Zobrazeno 1 - 10
of 2 675
pro vyhledávání: '"Sql Injection"'
Publikováno v:
Journal of Applied Informatics and Computing, Vol 8, Iss 1, Pp 194-202 (2024)
This study compares the performance of two machine learning algorithms the Decision Tree and Random Forest. SQL Injection attacks continue to threaten web applications because they exploit vulnerabilities by injecting malicious code into SQL statemen
Externí odkaz:
https://doaj.org/article/a35711357ee84918b8936a09130115e1
Publikováno v:
IEEE Access, Vol 12, Pp 107689-107703 (2024)
A web application is prone to security threats due to its open nature. The security of these platforms is imperative for organizations of all sizes because they store sensitive information. Consequently, exploiting web application vulnerabilities cou
Externí odkaz:
https://doaj.org/article/d5fb2aeda43d431eb8aad88664298097
Autor:
Maryam Mehmood, Asad Ijaz
Publikováno v:
NUML International Journal of Engineering and Computing, Vol 2, Iss 2 (2024)
With the increasing use of web applications, concerns for data integrity and security have increased manifolds in the current time. The growth in quantity of internet clients and sites has made the web security circumstances progressively extreme. St
Externí odkaz:
https://doaj.org/article/57e3fa767ec642b0ba93797f212b3896
Publikováno v:
Data in Brief, Vol 54, Iss , Pp 110289- (2024)
We present the ‘NoSQL Injection Dataset for MongoDB, a comprehensive collection of data obtained from diverse projects focusing on NoSQL attacks on MongoDB databases.In the present era, we can classify databases into three main types: structured, s
Externí odkaz:
https://doaj.org/article/90e52bfb7c1a4126a8622bb21ac9c10b
Publikováno v:
Mathematics, Vol 12, Iss 18, p 2917 (2024)
Since SQL injection allows attackers to interact with the database of applications, it is regarded as a significant security problem. By applying machine learning algorithms, SQL injection attacks can be identified. Problem: In the training stage of
Externí odkaz:
https://doaj.org/article/fa50a4f6d98343f6b74210b13eee6111
Publikováno v:
Applied Sciences, Vol 14, Iss 18, p 8365 (2024)
The rapid proliferation of network applications has led to a significant increase in network attacks. According to the OWASP Top 10 Projects report released in 2021, injection attacks rank among the top three vulnerabilities in software projects. Thi
Externí odkaz:
https://doaj.org/article/52a3da19fbe54d7ba720383f108d16b2
Autor:
Zhiwen Gui, Enze Wang, Binbin Deng, Mingyuan Zhang, Yitao Chen, Shengfei Wei, Wei Xie, Baosheng Wang
Publikováno v:
Applied Sciences, Vol 14, Iss 16, p 6929 (2024)
SQL injection (SQLI) black-box detection, which simulates external attack scenarios, is crucial for assessing vulnerabilities in real-world web applications. However, existing black-box detection methods rely on predefined rules to cover the most com
Externí odkaz:
https://doaj.org/article/1160880b64664abc9353c6ea9a8721c4
Autor:
Ahmad Zaini, Rony Wijanarko
Publikováno v:
Jurnal Informatika dan Rekayasa Perangkat Lunak, Vol 5, Iss 2, Pp 262-272 (2023)
Wahid Hasyim University has a website that contains information and documents that are published and can be accessed by users. One of the most crucial websites is the New Student Admissions (PMB) website. The rise of population data leaks in Indonesi
Externí odkaz:
https://doaj.org/article/9b668c74aa654d3584f7b39cad25e273
Autor:
Muhammad Fahmi Al Azhar, Ruki Harwahyu
Publikováno v:
Multitek Indonesia, Vol 17, Iss 1, Pp 69-78 (2023)
QL Injection attacks are still one type of attack that often occurs in web-based applications. The causes and ways to prevent SQL Injection have been widely explained in various sources. Unfortunately, until now, SQL Injection vulnerabilities are sti
Externí odkaz:
https://doaj.org/article/2cab02ad6ccb4214b083baf1f46d2956
Publikováno v:
Informatics, Vol 11, Iss 2, p 15 (2024)
Structured Query Language (SQL) injections pose a constant threat to web services, highlighting the need for efficient detection to address this vulnerability. This study compares machine learning algorithms for detecting SQL injections in web micros
Externí odkaz:
https://doaj.org/article/226fd125e28342f58e33c428851b8cb1