Search Results - Dataset SQL injection Anomaly detection

Refine Results
  1. 1

    Application of Artificial Intelligence in Detecting SQL Injection Attacks by Augustine, Nwabudike, Md. Sultan, Abu Bakar, Osman, Mohd Hafeez, Sharif, Khaironi Yatim

    ISSN: 2549-9610, 2549-9904
    Published: 31.12.2024
    “… Datasets of well-known SQL injection attack patterns and AI/ML models intended for cybersecurity anomaly detection are among the resources underexplored…”
    Get full text
    Journal Article
  2. 2

    Feature Engineering for Injection Attack Detection: An Exploration from SQLI to XSS by Loginov, Alexander, Zincir-Heywood, Nur, Heywood, Malcolm

    ISSN: 2768-0029
    Published: IEEE 16.10.2023
    “… To this end, the proposed data preprocessing and feature engineering method is compared against state-of-the-art SQL injection detection on two different datasets using KNN, DT and SVM as classifiers…”
    Get full text
    Conference Proceeding
  3. 3

    Trident: Detecting SQL Injection Attacks via Abstract Syntax Tree-based Neural Network by Li, Yuanlin, Xu, Zhiwei, Zhou, Min, Wan, Hai, Zhao, Xibin

    ISSN: 2643-1572
    Published: ACM 27.10.2024
    “…SQL injection attacks have posed a significant threat to web applications for decades…”
    Get full text
    Conference Proceeding
  4. 4

    Machine Learning and Deep Learning Techniques for Internet of Things Network Anomaly Detection—Current Research Trends by Rafique, Saida Hafsa, Abdallah, Amira, Musa, Nura Shifa, Murugan, Thangavel

    ISSN: 1424-8220, 1424-8220
    Published: Switzerland MDPI AG 20.03.2024
    Published in Sensors (Basel, Switzerland) (20.03.2024)
    “… AI-based anomaly detection systems are capable of identifying a wide range of threats in IoT environments, including brute force, buffer overflow, injection, replay attacks, DDoS assault, SQL…”
    Get full text
    Journal Article
  5. 5

    SQL-GENIE: SQL Protection using GENerative Modeling for Anomaly Detection against Injection and Evolved Adversarial Attacks by Afrin, Sadia, Elsayed, Marwa A., Zincir-Heywood, Nur

    ISSN: 2836-3795
    Published: IEEE 08.07.2025
    “… The growing surge and sophistication of large-scale SQL injection (SQLi) attacks highlight the urgent need for advanced detection mechanisms to protect sensitive information, especially in cloud-based environments…”
    Get full text
    Conference Proceeding
  6. 6

    Detecting Web Attacks From HTTP Weblogs Using Variational LSTM Autoencoder Deviation Network by Jagat, Rikhi Ram, Sisodia, Dilip Singh, Singh, Pradeep

    ISSN: 1939-1374, 2372-0204
    Published: IEEE 01.09.2024
    Published in IEEE transactions on services computing (01.09.2024)
    “… Recent studies focus on recognizing web attacks through deep neural network-based anomaly detection…”
    Get full text
    Journal Article
  7. 7

    Advanced Detection and Prevention of SQL Injection Attacks Using Machine Learning Techniques for Enhanced Web Security by Pooja Panadiya, Prof. Manish Kumar Singhal

    ISSN: 2395-6011, 2395-602X
    Published: 12.12.2024
    “… This paper presents an advanced framework for detecting and preventing SQL injection attacks using machine learning techniques to enhance web security…”
    Get full text
    Journal Article
  8. 8

    A Multi-Class Intrusion Detection System Based on Continual Learning by Oikonomou, Chrysoula, Iliopoulos, Ilias, Ioannidis, Dimosthenis, Tzovaras, Dimitrios

    Published: IEEE 31.07.2023
    “…) based on continual learning with a CNN backbone. Using the LYCOS-IDS2017 dataset, the study explores several continuous learning techniques for identifying threats including denial-of-service and SQL injection…”
    Get full text
    Conference Proceeding
  9. 9
  10. 10

    Enhancing SQL Query Security using Graph-based Hierarchical Embeddings with SMOTE and Advanced Neural Networks for Robust Detection by K, Mangaiyarkarasi, P. S., Uma Priyadarsini

    Published: Bharati Vidyapeeth, New Delhi 02.04.2025
    “…SQL Injection Attacks (SQLIA) are still a significant security vulnerability, targeting issues in database query validation for intruder access…”
    Get full text
    Conference Proceeding
  11. 11

    A Thirty-Day Dataset of Malicious HTTP Requests Blocked by OWASP ModSecurity on a Production Web Server by Lucz, Geza, Forstner, Bertalan

    ISSN: 2306-5729, 2306-5729
    Published: Basel MDPI AG 01.11.2025
    Published in Data (Basel) (01.11.2025)
    “…), resulting in its inclusion in the audit log due to suspected exploitation attempts. The dataset includes attack categories such as SQL injection, cross-site scripting (XSS…”
    Get full text
    Journal Article
  12. 12

    Machine Learning Empowered Security Management and Quality of Service Provision in SDN-NFV Environment by Shahzadi, Shumaila, Ahmad, Fahad, Basharat, Asma, Alruwaili, Madallah, Alanazi, Saad, Humayun, Mamoona, Rizwan, Muhammad, Naseem, Shahid

    ISSN: 1546-2226, 1546-2218, 1546-2226
    Published: Henderson Tech Science Press 2021
    Published in Computers, materials & continua (2021)
    “…With the rising demand for data access, network service providers face the challenge of growing their capital and operating costs while at the same time…”
    Get full text
    Journal Article
  13. 13

    Intelligent Anomaly Detection in Database Security: A Triple-Loop Learning Framework by Kandolo, William

    Published: IEEE 19.05.2025
    “…), and meta-learning for real-time anomaly detection in SQL-based environments. To the best of our knowledge, TLL is the first framework to unify these three learning…”
    Get full text
    Conference Proceeding
  14. 14

    GENI: GANs Evaluation of iNjection attacks on IoT by Afrin, Sadia, Elsayed, Marwa A., Zincir-Heywood, Nur

    ISSN: 2768-1734
    Published: IEEE 10.11.2024
    Published in IEEE World Forum on Internet of Things (10.11.2024)
    “… In this research, we tackle the challenge of detecting SQL injection attacks and propose GENI, GANs evaluation of injection attacks on IoT networks…”
    Get full text
    Conference Proceeding
  15. 15

    Revolutionizing Threat Hunting in Communication Networks: Introducing a Cutting-Edge Large-Scale Multiclass Dataset by Al-Haija, Qasem Abu, Masoud, Zaid, Yasin, Assim, Alesawi, Karam, Alkarnawi, Yousef

    ISSN: 2573-3346
    Published: IEEE 13.08.2024
    “… In this paper, we develop a new threat-hunting model for communication networks and introduce a novel, cutting-edge, large-scale multiclass dataset to improve the security of network cognition…”
    Get full text
    Conference Proceeding
  16. 16

    Cyber Threat Attack Level Detection Using Machine Learning by R, Rahul, Mythili, S.

    Published: IEEE 05.02.2025
    “… The study effectively proved the ability to detect numerous attack types, such as SQL injection…”
    Get full text
    Conference Proceeding
  17. 17

    LNKDSEA: Machine Learning Based IoT/IIoT Attack Detection Method by Koppula, Manasa, I, Leo Joseph L. M.

    Published: IEEE 19.04.2023
    “…s. Practical defenses against this, including network anomaly detection, must be built to secure IoT networks…”
    Get full text
    Conference Proceeding
  18. 18

    Comprehensive Study of SQL Injection Attacks Mitigation Methods and Future Directions by Al-olaqi, Mohammed, Al-gailani, Ahmed, Rahman, M M Hafizur

    ISSN: 3079-5354, 3079-5354
    Published: 01.12.2025
    “…Structured Query Language Injection Attack (SQLIA) as a form of cyber threats are among the most dangerous, easily penetrating the databases, and most web based applications…”
    Get full text
    Journal Article
  19. 19

    Machine Learning Approach to Intrusion Detection: Performance Evaluation by Giraddi, Vishal, Giraddi, Shantala, D G, Narayan, Bidaragaddi, Anupama, Kanakareddi, Suvarna G

    ISSN: 1877-0509, 1877-0509
    Published: Elsevier B.V 2024
    Published in Procedia computer science (2024)
    “… In this paper, authors aim to build framework based on various machine learning models (ML) to capture anomaly packets…”
    Get full text
    Journal Article
  20. 20

    Identifying Security Threats in the System Using Automated Security Logs by Kanaparthi, Yadidiah, Abdellatif, Tamer Mohamed, Seyam, Ahmed Ali, Satrya, Gandeva Bayu

    Published: IEEE 22.11.2024
    “… Several tests like failed login, unauthorized access, Denial of Service (DOS), and SQL Injection attempts were conducted to assess the security of the login page…”
    Get full text
    Conference Proceeding