Suchergebnisse - Dataset SQL injection Anomaly detection

  1. 1

    Application of Artificial Intelligence in Detecting SQL Injection Attacks von Augustine, Nwabudike, Md. Sultan, Abu Bakar, Osman, Mohd Hafeez, Sharif, Khaironi Yatim

    ISSN: 2549-9610, 2549-9904
    Veröffentlicht: 31.12.2024
    “… Datasets of well-known SQL injection attack patterns and AI/ML models intended for cybersecurity anomaly detection are among the resources underexplored …”
    Volltext
    Journal Article
  2. 2

    Feature Engineering for Injection Attack Detection: An Exploration from SQLI to XSS von Loginov, Alexander, Zincir-Heywood, Nur, Heywood, Malcolm

    ISSN: 2768-0029
    Veröffentlicht: IEEE 16.10.2023
    Veröffentlicht in Cyber Security in Networking Conference (Online) (16.10.2023)
    “… To this end, the proposed data preprocessing and feature engineering method is compared against state-of-the-art SQL injection detection on two different datasets using KNN, DT and SVM as classifiers …”
    Volltext
    Tagungsbericht
  3. 3

    Trident: Detecting SQL Injection Attacks via Abstract Syntax Tree-based Neural Network von Li, Yuanlin, Xu, Zhiwei, Zhou, Min, Wan, Hai, Zhao, Xibin

    ISSN: 2643-1572
    Veröffentlicht: ACM 27.10.2024
    “… SQL injection attacks have posed a significant threat to web applications for decades …”
    Volltext
    Tagungsbericht
  4. 4

    Machine Learning and Deep Learning Techniques for Internet of Things Network Anomaly Detection—Current Research Trends von Rafique, Saida Hafsa, Abdallah, Amira, Musa, Nura Shifa, Murugan, Thangavel

    ISSN: 1424-8220, 1424-8220
    Veröffentlicht: Switzerland MDPI AG 20.03.2024
    Veröffentlicht in Sensors (Basel, Switzerland) (20.03.2024)
    “… AI-based anomaly detection systems are capable of identifying a wide range of threats in IoT environments, including brute force, buffer overflow, injection, replay attacks, DDoS assault, SQL …”
    Volltext
    Journal Article
  5. 5

    SQL-GENIE: SQL Protection using GENerative Modeling for Anomaly Detection against Injection and Evolved Adversarial Attacks von Afrin, Sadia, Elsayed, Marwa A., Zincir-Heywood, Nur

    ISSN: 2836-3795
    Veröffentlicht: IEEE 08.07.2025
    “… The growing surge and sophistication of large-scale SQL injection (SQLi) attacks highlight the urgent need for advanced detection mechanisms to protect sensitive information, especially in cloud-based environments …”
    Volltext
    Tagungsbericht
  6. 6

    Detecting Web Attacks From HTTP Weblogs Using Variational LSTM Autoencoder Deviation Network von Jagat, Rikhi Ram, Sisodia, Dilip Singh, Singh, Pradeep

    ISSN: 1939-1374, 2372-0204
    Veröffentlicht: IEEE 01.09.2024
    Veröffentlicht in IEEE transactions on services computing (01.09.2024)
    “… Recent studies focus on recognizing web attacks through deep neural network-based anomaly detection …”
    Volltext
    Journal Article
  7. 7

    Advanced Detection and Prevention of SQL Injection Attacks Using Machine Learning Techniques for Enhanced Web Security von Pooja Panadiya, Prof. Manish Kumar Singhal

    ISSN: 2395-6011, 2395-602X
    Veröffentlicht: 12.12.2024
    “… This paper presents an advanced framework for detecting and preventing SQL injection attacks using machine learning techniques to enhance web security …”
    Volltext
    Journal Article
  8. 8

    A Multi-Class Intrusion Detection System Based on Continual Learning von Oikonomou, Chrysoula, Iliopoulos, Ilias, Ioannidis, Dimosthenis, Tzovaras, Dimitrios

    Veröffentlicht: IEEE 31.07.2023
    “… ) based on continual learning with a CNN backbone. Using the LYCOS-IDS2017 dataset, the study explores several continuous learning techniques for identifying threats including denial-of-service and SQL injection …”
    Volltext
    Tagungsbericht
  9. 9
  10. 10

    Enhancing SQL Query Security using Graph-based Hierarchical Embeddings with SMOTE and Advanced Neural Networks for Robust Detection von K, Mangaiyarkarasi, P. S., Uma Priyadarsini

    Veröffentlicht: Bharati Vidyapeeth, New Delhi 02.04.2025
    “… SQL Injection Attacks (SQLIA) are still a significant security vulnerability, targeting issues in database query validation for intruder access …”
    Volltext
    Tagungsbericht
  11. 11

    A Thirty-Day Dataset of Malicious HTTP Requests Blocked by OWASP ModSecurity on a Production Web Server von Lucz, Geza, Forstner, Bertalan

    ISSN: 2306-5729, 2306-5729
    Veröffentlicht: Basel MDPI AG 01.11.2025
    Veröffentlicht in Data (Basel) (01.11.2025)
    “… ), resulting in its inclusion in the audit log due to suspected exploitation attempts. The dataset includes attack categories such as SQL injection, cross-site scripting (XSS …”
    Volltext
    Journal Article
  12. 12

    Machine Learning Empowered Security Management and Quality of Service Provision in SDN-NFV Environment von Shahzadi, Shumaila, Ahmad, Fahad, Basharat, Asma, Alruwaili, Madallah, Alanazi, Saad, Humayun, Mamoona, Rizwan, Muhammad, Naseem, Shahid

    ISSN: 1546-2226, 1546-2218, 1546-2226
    Veröffentlicht: Henderson Tech Science Press 2021
    Veröffentlicht in Computers, materials & continua (2021)
    “… With the rising demand for data access, network service providers face the challenge of growing their capital and operating costs while at the same time …”
    Volltext
    Journal Article
  13. 13

    Intelligent Anomaly Detection in Database Security: A Triple-Loop Learning Framework von Kandolo, William

    Veröffentlicht: IEEE 19.05.2025
    “… ), and meta-learning for real-time anomaly detection in SQL-based environments. To the best of our knowledge, TLL is the first framework to unify these three learning …”
    Volltext
    Tagungsbericht
  14. 14

    GENI: GANs Evaluation of iNjection attacks on IoT von Afrin, Sadia, Elsayed, Marwa A., Zincir-Heywood, Nur

    ISSN: 2768-1734
    Veröffentlicht: IEEE 10.11.2024
    Veröffentlicht in IEEE World Forum on Internet of Things (10.11.2024)
    “… In this research, we tackle the challenge of detecting SQL injection attacks and propose GENI, GANs evaluation of injection attacks on IoT networks …”
    Volltext
    Tagungsbericht
  15. 15

    Revolutionizing Threat Hunting in Communication Networks: Introducing a Cutting-Edge Large-Scale Multiclass Dataset von Al-Haija, Qasem Abu, Masoud, Zaid, Yasin, Assim, Alesawi, Karam, Alkarnawi, Yousef

    ISSN: 2573-3346
    Veröffentlicht: IEEE 13.08.2024
    “… In this paper, we develop a new threat-hunting model for communication networks and introduce a novel, cutting-edge, large-scale multiclass dataset to improve the security of network cognition …”
    Volltext
    Tagungsbericht
  16. 16

    Cyber Threat Attack Level Detection Using Machine Learning von R, Rahul, Mythili, S.

    Veröffentlicht: IEEE 05.02.2025
    “… The study effectively proved the ability to detect numerous attack types, such as SQL injection …”
    Volltext
    Tagungsbericht
  17. 17

    LNKDSEA: Machine Learning Based IoT/IIoT Attack Detection Method von Koppula, Manasa, I, Leo Joseph L. M.

    Veröffentlicht: IEEE 19.04.2023
    “… s. Practical defenses against this, including network anomaly detection, must be built to secure IoT networks …”
    Volltext
    Tagungsbericht
  18. 18

    Comprehensive Study of SQL Injection Attacks Mitigation Methods and Future Directions von Al-olaqi, Mohammed, Al-gailani, Ahmed, Rahman, M M Hafizur

    ISSN: 3079-5354, 3079-5354
    Veröffentlicht: 01.12.2025
    Veröffentlicht in Journal of Cyber Security and Risk Auditing (01.12.2025)
    “… Structured Query Language Injection Attack (SQLIA) as a form of cyber threats are among the most dangerous, easily penetrating the databases, and most web based applications …”
    Volltext
    Journal Article
  19. 19

    Machine Learning Approach to Intrusion Detection: Performance Evaluation von Giraddi, Vishal, Giraddi, Shantala, D G, Narayan, Bidaragaddi, Anupama, Kanakareddi, Suvarna G

    ISSN: 1877-0509, 1877-0509
    Veröffentlicht: Elsevier B.V 2024
    Veröffentlicht in Procedia computer science (2024)
    “… In this paper, authors aim to build framework based on various machine learning models (ML) to capture anomaly packets …”
    Volltext
    Journal Article
  20. 20

    Identifying Security Threats in the System Using Automated Security Logs von Kanaparthi, Yadidiah, Abdellatif, Tamer Mohamed, Seyam, Ahmed Ali, Satrya, Gandeva Bayu

    Veröffentlicht: IEEE 22.11.2024
    “… Several tests like failed login, unauthorized access, Denial of Service (DOS), and SQL Injection attempts were conducted to assess the security of the login page …”
    Volltext
    Tagungsbericht