Výsledky vyhledávání - Dataset SQL injection Anomaly detection

  1. 1

    Application of Artificial Intelligence in Detecting SQL Injection Attacks Autor Augustine, Nwabudike, Md. Sultan, Abu Bakar, Osman, Mohd Hafeez, Sharif, Khaironi Yatim

    ISSN: 2549-9610, 2549-9904
    Vydáno: 31.12.2024
    “… Datasets of well-known SQL injection attack patterns and AI/ML models intended for cybersecurity anomaly detection are among the resources underexplored…”
    Získat plný text
    Journal Article
  2. 2

    Feature Engineering for Injection Attack Detection: An Exploration from SQLI to XSS Autor Loginov, Alexander, Zincir-Heywood, Nur, Heywood, Malcolm

    ISSN: 2768-0029
    Vydáno: IEEE 16.10.2023
    “… To this end, the proposed data preprocessing and feature engineering method is compared against state-of-the-art SQL injection detection on two different datasets using KNN, DT and SVM as classifiers…”
    Získat plný text
    Konferenční příspěvek
  3. 3

    Trident: Detecting SQL Injection Attacks via Abstract Syntax Tree-based Neural Network Autor Li, Yuanlin, Xu, Zhiwei, Zhou, Min, Wan, Hai, Zhao, Xibin

    ISSN: 2643-1572
    Vydáno: ACM 27.10.2024
    “…SQL injection attacks have posed a significant threat to web applications for decades…”
    Získat plný text
    Konferenční příspěvek
  4. 4

    Machine Learning and Deep Learning Techniques for Internet of Things Network Anomaly Detection—Current Research Trends Autor Rafique, Saida Hafsa, Abdallah, Amira, Musa, Nura Shifa, Murugan, Thangavel

    ISSN: 1424-8220, 1424-8220
    Vydáno: Switzerland MDPI AG 20.03.2024
    Vydáno v Sensors (Basel, Switzerland) (20.03.2024)
    “… AI-based anomaly detection systems are capable of identifying a wide range of threats in IoT environments, including brute force, buffer overflow, injection, replay attacks, DDoS assault, SQL…”
    Získat plný text
    Journal Article
  5. 5

    SQL-GENIE: SQL Protection using GENerative Modeling for Anomaly Detection against Injection and Evolved Adversarial Attacks Autor Afrin, Sadia, Elsayed, Marwa A., Zincir-Heywood, Nur

    ISSN: 2836-3795
    Vydáno: IEEE 08.07.2025
    “… The growing surge and sophistication of large-scale SQL injection (SQLi) attacks highlight the urgent need for advanced detection mechanisms to protect sensitive information, especially in cloud-based environments…”
    Získat plný text
    Konferenční příspěvek
  6. 6

    Detecting Web Attacks From HTTP Weblogs Using Variational LSTM Autoencoder Deviation Network Autor Jagat, Rikhi Ram, Sisodia, Dilip Singh, Singh, Pradeep

    ISSN: 1939-1374, 2372-0204
    Vydáno: IEEE 01.09.2024
    “… Recent studies focus on recognizing web attacks through deep neural network-based anomaly detection…”
    Získat plný text
    Journal Article
  7. 7

    Advanced Detection and Prevention of SQL Injection Attacks Using Machine Learning Techniques for Enhanced Web Security Autor Pooja Panadiya, Prof. Manish Kumar Singhal

    ISSN: 2395-6011, 2395-602X
    Vydáno: 12.12.2024
    “… This paper presents an advanced framework for detecting and preventing SQL injection attacks using machine learning techniques to enhance web security…”
    Získat plný text
    Journal Article
  8. 8

    A Multi-Class Intrusion Detection System Based on Continual Learning Autor Oikonomou, Chrysoula, Iliopoulos, Ilias, Ioannidis, Dimosthenis, Tzovaras, Dimitrios

    Vydáno: IEEE 31.07.2023
    “…) based on continual learning with a CNN backbone. Using the LYCOS-IDS2017 dataset, the study explores several continuous learning techniques for identifying threats including denial-of-service and SQL injection…”
    Získat plný text
    Konferenční příspěvek
  9. 9
  10. 10

    Enhancing SQL Query Security using Graph-based Hierarchical Embeddings with SMOTE and Advanced Neural Networks for Robust Detection Autor K, Mangaiyarkarasi, P. S., Uma Priyadarsini

    Vydáno: Bharati Vidyapeeth, New Delhi 02.04.2025
    “…SQL Injection Attacks (SQLIA) are still a significant security vulnerability, targeting issues in database query validation for intruder access…”
    Získat plný text
    Konferenční příspěvek
  11. 11

    A Thirty-Day Dataset of Malicious HTTP Requests Blocked by OWASP ModSecurity on a Production Web Server Autor Lucz, Geza, Forstner, Bertalan

    ISSN: 2306-5729, 2306-5729
    Vydáno: Basel MDPI AG 01.11.2025
    Vydáno v Data (Basel) (01.11.2025)
    “…), resulting in its inclusion in the audit log due to suspected exploitation attempts. The dataset includes attack categories such as SQL injection, cross-site scripting (XSS…”
    Získat plný text
    Journal Article
  12. 12

    Machine Learning Empowered Security Management and Quality of Service Provision in SDN-NFV Environment Autor Shahzadi, Shumaila, Ahmad, Fahad, Basharat, Asma, Alruwaili, Madallah, Alanazi, Saad, Humayun, Mamoona, Rizwan, Muhammad, Naseem, Shahid

    ISSN: 1546-2226, 1546-2218, 1546-2226
    Vydáno: Henderson Tech Science Press 2021
    “…With the rising demand for data access, network service providers face the challenge of growing their capital and operating costs while at the same time…”
    Získat plný text
    Journal Article
  13. 13

    Intelligent Anomaly Detection in Database Security: A Triple-Loop Learning Framework Autor Kandolo, William

    Vydáno: IEEE 19.05.2025
    “…), and meta-learning for real-time anomaly detection in SQL-based environments. To the best of our knowledge, TLL is the first framework to unify these three learning…”
    Získat plný text
    Konferenční příspěvek
  14. 14

    GENI: GANs Evaluation of iNjection attacks on IoT Autor Afrin, Sadia, Elsayed, Marwa A., Zincir-Heywood, Nur

    ISSN: 2768-1734
    Vydáno: IEEE 10.11.2024
    “… In this research, we tackle the challenge of detecting SQL injection attacks and propose GENI, GANs evaluation of injection attacks on IoT networks…”
    Získat plný text
    Konferenční příspěvek
  15. 15

    Revolutionizing Threat Hunting in Communication Networks: Introducing a Cutting-Edge Large-Scale Multiclass Dataset Autor Al-Haija, Qasem Abu, Masoud, Zaid, Yasin, Assim, Alesawi, Karam, Alkarnawi, Yousef

    ISSN: 2573-3346
    Vydáno: IEEE 13.08.2024
    “… In this paper, we develop a new threat-hunting model for communication networks and introduce a novel, cutting-edge, large-scale multiclass dataset to improve the security of network cognition…”
    Získat plný text
    Konferenční příspěvek
  16. 16

    Cyber Threat Attack Level Detection Using Machine Learning Autor R, Rahul, Mythili, S.

    Vydáno: IEEE 05.02.2025
    “… The study effectively proved the ability to detect numerous attack types, such as SQL injection…”
    Získat plný text
    Konferenční příspěvek
  17. 17

    LNKDSEA: Machine Learning Based IoT/IIoT Attack Detection Method Autor Koppula, Manasa, I, Leo Joseph L. M.

    Vydáno: IEEE 19.04.2023
    “…s. Practical defenses against this, including network anomaly detection, must be built to secure IoT networks…”
    Získat plný text
    Konferenční příspěvek
  18. 18

    Comprehensive Study of SQL Injection Attacks Mitigation Methods and Future Directions Autor Al-olaqi, Mohammed, Al-gailani, Ahmed, Rahman, M M Hafizur

    ISSN: 3079-5354, 3079-5354
    Vydáno: 01.12.2025
    “…Structured Query Language Injection Attack (SQLIA) as a form of cyber threats are among the most dangerous, easily penetrating the databases, and most web based applications…”
    Získat plný text
    Journal Article
  19. 19

    Machine Learning Approach to Intrusion Detection: Performance Evaluation Autor Giraddi, Vishal, Giraddi, Shantala, D G, Narayan, Bidaragaddi, Anupama, Kanakareddi, Suvarna G

    ISSN: 1877-0509, 1877-0509
    Vydáno: Elsevier B.V 2024
    Vydáno v Procedia computer science (2024)
    “… In this paper, authors aim to build framework based on various machine learning models (ML) to capture anomaly packets…”
    Získat plný text
    Journal Article
  20. 20

    Identifying Security Threats in the System Using Automated Security Logs Autor Kanaparthi, Yadidiah, Abdellatif, Tamer Mohamed, Seyam, Ahmed Ali, Satrya, Gandeva Bayu

    Vydáno: IEEE 22.11.2024
    “… Several tests like failed login, unauthorized access, Denial of Service (DOS), and SQL Injection attempts were conducted to assess the security of the login page…”
    Získat plný text
    Konferenční příspěvek