Výsledky vyhľadávania - Dataset SQL injection Anomaly detection

  1. 1

    Application of Artificial Intelligence in Detecting SQL Injection Attacks Autor Augustine, Nwabudike, Md. Sultan, Abu Bakar, Osman, Mohd Hafeez, Sharif, Khaironi Yatim

    ISSN: 2549-9610, 2549-9904
    Vydavateľské údaje: 31.12.2024
    “… Datasets of well-known SQL injection attack patterns and AI/ML models intended for cybersecurity anomaly detection are among the resources underexplored…”
    Získať plný text
    Journal Article
  2. 2

    Feature Engineering for Injection Attack Detection: An Exploration from SQLI to XSS Autor Loginov, Alexander, Zincir-Heywood, Nur, Heywood, Malcolm

    ISSN: 2768-0029
    Vydavateľské údaje: IEEE 16.10.2023
    “… To this end, the proposed data preprocessing and feature engineering method is compared against state-of-the-art SQL injection detection on two different datasets using KNN, DT and SVM as classifiers…”
    Získať plný text
    Konferenčný príspevok..
  3. 3

    Trident: Detecting SQL Injection Attacks via Abstract Syntax Tree-based Neural Network Autor Li, Yuanlin, Xu, Zhiwei, Zhou, Min, Wan, Hai, Zhao, Xibin

    ISSN: 2643-1572
    Vydavateľské údaje: ACM 27.10.2024
    “…SQL injection attacks have posed a significant threat to web applications for decades…”
    Získať plný text
    Konferenčný príspevok..
  4. 4

    Machine Learning and Deep Learning Techniques for Internet of Things Network Anomaly Detection—Current Research Trends Autor Rafique, Saida Hafsa, Abdallah, Amira, Musa, Nura Shifa, Murugan, Thangavel

    ISSN: 1424-8220, 1424-8220
    Vydavateľské údaje: Switzerland MDPI AG 20.03.2024
    Vydané v Sensors (Basel, Switzerland) (20.03.2024)
    “… AI-based anomaly detection systems are capable of identifying a wide range of threats in IoT environments, including brute force, buffer overflow, injection, replay attacks, DDoS assault, SQL…”
    Získať plný text
    Journal Article
  5. 5

    SQL-GENIE: SQL Protection using GENerative Modeling for Anomaly Detection against Injection and Evolved Adversarial Attacks Autor Afrin, Sadia, Elsayed, Marwa A., Zincir-Heywood, Nur

    ISSN: 2836-3795
    Vydavateľské údaje: IEEE 08.07.2025
    “… The growing surge and sophistication of large-scale SQL injection (SQLi) attacks highlight the urgent need for advanced detection mechanisms to protect sensitive information, especially in cloud-based environments…”
    Získať plný text
    Konferenčný príspevok..
  6. 6

    Detecting Web Attacks From HTTP Weblogs Using Variational LSTM Autoencoder Deviation Network Autor Jagat, Rikhi Ram, Sisodia, Dilip Singh, Singh, Pradeep

    ISSN: 1939-1374, 2372-0204
    Vydavateľské údaje: IEEE 01.09.2024
    “… Recent studies focus on recognizing web attacks through deep neural network-based anomaly detection…”
    Získať plný text
    Journal Article
  7. 7

    Advanced Detection and Prevention of SQL Injection Attacks Using Machine Learning Techniques for Enhanced Web Security Autor Pooja Panadiya, Prof. Manish Kumar Singhal

    ISSN: 2395-6011, 2395-602X
    Vydavateľské údaje: 12.12.2024
    “… This paper presents an advanced framework for detecting and preventing SQL injection attacks using machine learning techniques to enhance web security…”
    Získať plný text
    Journal Article
  8. 8

    A Multi-Class Intrusion Detection System Based on Continual Learning Autor Oikonomou, Chrysoula, Iliopoulos, Ilias, Ioannidis, Dimosthenis, Tzovaras, Dimitrios

    Vydavateľské údaje: IEEE 31.07.2023
    “…) based on continual learning with a CNN backbone. Using the LYCOS-IDS2017 dataset, the study explores several continuous learning techniques for identifying threats including denial-of-service and SQL injection…”
    Získať plný text
    Konferenčný príspevok..
  9. 9
  10. 10

    Enhancing SQL Query Security using Graph-based Hierarchical Embeddings with SMOTE and Advanced Neural Networks for Robust Detection Autor K, Mangaiyarkarasi, P. S., Uma Priyadarsini

    Vydavateľské údaje: Bharati Vidyapeeth, New Delhi 02.04.2025
    “…SQL Injection Attacks (SQLIA) are still a significant security vulnerability, targeting issues in database query validation for intruder access…”
    Získať plný text
    Konferenčný príspevok..
  11. 11

    A Thirty-Day Dataset of Malicious HTTP Requests Blocked by OWASP ModSecurity on a Production Web Server Autor Lucz, Geza, Forstner, Bertalan

    ISSN: 2306-5729, 2306-5729
    Vydavateľské údaje: Basel MDPI AG 01.11.2025
    Vydané v Data (Basel) (01.11.2025)
    “…), resulting in its inclusion in the audit log due to suspected exploitation attempts. The dataset includes attack categories such as SQL injection, cross-site scripting (XSS…”
    Získať plný text
    Journal Article
  12. 12

    Machine Learning Empowered Security Management and Quality of Service Provision in SDN-NFV Environment Autor Shahzadi, Shumaila, Ahmad, Fahad, Basharat, Asma, Alruwaili, Madallah, Alanazi, Saad, Humayun, Mamoona, Rizwan, Muhammad, Naseem, Shahid

    ISSN: 1546-2226, 1546-2218, 1546-2226
    Vydavateľské údaje: Henderson Tech Science Press 2021
    “…With the rising demand for data access, network service providers face the challenge of growing their capital and operating costs while at the same time…”
    Získať plný text
    Journal Article
  13. 13

    Intelligent Anomaly Detection in Database Security: A Triple-Loop Learning Framework Autor Kandolo, William

    Vydavateľské údaje: IEEE 19.05.2025
    “…), and meta-learning for real-time anomaly detection in SQL-based environments. To the best of our knowledge, TLL is the first framework to unify these three learning…”
    Získať plný text
    Konferenčný príspevok..
  14. 14

    GENI: GANs Evaluation of iNjection attacks on IoT Autor Afrin, Sadia, Elsayed, Marwa A., Zincir-Heywood, Nur

    ISSN: 2768-1734
    Vydavateľské údaje: IEEE 10.11.2024
    “… In this research, we tackle the challenge of detecting SQL injection attacks and propose GENI, GANs evaluation of injection attacks on IoT networks…”
    Získať plný text
    Konferenčný príspevok..
  15. 15

    Revolutionizing Threat Hunting in Communication Networks: Introducing a Cutting-Edge Large-Scale Multiclass Dataset Autor Al-Haija, Qasem Abu, Masoud, Zaid, Yasin, Assim, Alesawi, Karam, Alkarnawi, Yousef

    ISSN: 2573-3346
    Vydavateľské údaje: IEEE 13.08.2024
    “… In this paper, we develop a new threat-hunting model for communication networks and introduce a novel, cutting-edge, large-scale multiclass dataset to improve the security of network cognition…”
    Získať plný text
    Konferenčný príspevok..
  16. 16

    Cyber Threat Attack Level Detection Using Machine Learning Autor R, Rahul, Mythili, S.

    Vydavateľské údaje: IEEE 05.02.2025
    “… The study effectively proved the ability to detect numerous attack types, such as SQL injection…”
    Získať plný text
    Konferenčný príspevok..
  17. 17

    LNKDSEA: Machine Learning Based IoT/IIoT Attack Detection Method Autor Koppula, Manasa, I, Leo Joseph L. M.

    Vydavateľské údaje: IEEE 19.04.2023
    “…s. Practical defenses against this, including network anomaly detection, must be built to secure IoT networks…”
    Získať plný text
    Konferenčný príspevok..
  18. 18

    Comprehensive Study of SQL Injection Attacks Mitigation Methods and Future Directions Autor Al-olaqi, Mohammed, Al-gailani, Ahmed, Rahman, M M Hafizur

    ISSN: 3079-5354, 3079-5354
    Vydavateľské údaje: 01.12.2025
    “…Structured Query Language Injection Attack (SQLIA) as a form of cyber threats are among the most dangerous, easily penetrating the databases, and most web based applications…”
    Získať plný text
    Journal Article
  19. 19

    Machine Learning Approach to Intrusion Detection: Performance Evaluation Autor Giraddi, Vishal, Giraddi, Shantala, D G, Narayan, Bidaragaddi, Anupama, Kanakareddi, Suvarna G

    ISSN: 1877-0509, 1877-0509
    Vydavateľské údaje: Elsevier B.V 2024
    Vydané v Procedia computer science (2024)
    “… In this paper, authors aim to build framework based on various machine learning models (ML) to capture anomaly packets…”
    Získať plný text
    Journal Article
  20. 20

    Identifying Security Threats in the System Using Automated Security Logs Autor Kanaparthi, Yadidiah, Abdellatif, Tamer Mohamed, Seyam, Ahmed Ali, Satrya, Gandeva Bayu

    Vydavateľské údaje: IEEE 22.11.2024
    “… Several tests like failed login, unauthorized access, Denial of Service (DOS), and SQL Injection attempts were conducted to assess the security of the login page…”
    Získať plný text
    Konferenčný príspevok..