Výsledky vyhledávání - Dataset SQL injection Anomaly detection
-
1
Application of Artificial Intelligence in Detecting SQL Injection Attacks
ISSN: 2549-9610, 2549-9904Vydáno: 31.12.2024Vydáno v JOIV : international journal on informatics visualization Online (31.12.2024)“… Datasets of well-known SQL injection attack patterns and AI/ML models intended for cybersecurity anomaly detection are among the resources underexplored…”
Získat plný text
Journal Article -
2
Feature Engineering for Injection Attack Detection: An Exploration from SQLI to XSS
ISSN: 2768-0029Vydáno: IEEE 16.10.2023Vydáno v Cyber Security in Networking Conference (Online) (16.10.2023)“… To this end, the proposed data preprocessing and feature engineering method is compared against state-of-the-art SQL injection detection on two different datasets using KNN, DT and SVM as classifiers…”
Získat plný text
Konferenční příspěvek -
3
Trident: Detecting SQL Injection Attacks via Abstract Syntax Tree-based Neural Network
ISSN: 2643-1572Vydáno: ACM 27.10.2024Vydáno v IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (27.10.2024)“…SQL injection attacks have posed a significant threat to web applications for decades…”
Získat plný text
Konferenční příspěvek -
4
Machine Learning and Deep Learning Techniques for Internet of Things Network Anomaly Detection—Current Research Trends
ISSN: 1424-8220, 1424-8220Vydáno: Switzerland MDPI AG 20.03.2024Vydáno v Sensors (Basel, Switzerland) (20.03.2024)“… AI-based anomaly detection systems are capable of identifying a wide range of threats in IoT environments, including brute force, buffer overflow, injection, replay attacks, DDoS assault, SQL…”
Získat plný text
Journal Article -
5
SQL-GENIE: SQL Protection using GENerative Modeling for Anomaly Detection against Injection and Evolved Adversarial Attacks
ISSN: 2836-3795Vydáno: IEEE 08.07.2025Vydáno v Proceedings : annual International Computer Software and Applications Conference (08.07.2025)“… The growing surge and sophistication of large-scale SQL injection (SQLi) attacks highlight the urgent need for advanced detection mechanisms to protect sensitive information, especially in cloud-based environments…”
Získat plný text
Konferenční příspěvek -
6
Detecting Web Attacks From HTTP Weblogs Using Variational LSTM Autoencoder Deviation Network
ISSN: 1939-1374, 2372-0204Vydáno: IEEE 01.09.2024Vydáno v IEEE transactions on services computing (01.09.2024)“… Recent studies focus on recognizing web attacks through deep neural network-based anomaly detection…”
Získat plný text
Journal Article -
7
Advanced Detection and Prevention of SQL Injection Attacks Using Machine Learning Techniques for Enhanced Web Security
ISSN: 2395-6011, 2395-602XVydáno: 12.12.2024Vydáno v International Journal of Scientific Research in Science and Technology (12.12.2024)“… This paper presents an advanced framework for detecting and preventing SQL injection attacks using machine learning techniques to enhance web security…”
Získat plný text
Journal Article -
8
A Multi-Class Intrusion Detection System Based on Continual Learning
Vydáno: IEEE 31.07.2023Vydáno v 2023 IEEE International Conference on Cyber Security and Resilience (CSR) (31.07.2023)“…) based on continual learning with a CNN backbone. Using the LYCOS-IDS2017 dataset, the study explores several continuous learning techniques for identifying threats including denial-of-service and SQL injection…”
Získat plný text
Konferenční příspěvek -
9
Identification of Important Features at Different IoT layers for Dynamic Attack Detection
“… One popular method of achieving this is with the use of intrusion detection systems (IDSs…”Vydáno: IEEE 01.05.2023
Získat plný text
Konferenční příspěvek -
10
Enhancing SQL Query Security using Graph-based Hierarchical Embeddings with SMOTE and Advanced Neural Networks for Robust Detection
Vydáno: Bharati Vidyapeeth, New Delhi 02.04.2025Vydáno v 2025 12th International Conference on Computing for Sustainable Global Development (INDIACom) (02.04.2025)“…SQL Injection Attacks (SQLIA) are still a significant security vulnerability, targeting issues in database query validation for intruder access…”
Získat plný text
Konferenční příspěvek -
11
A Thirty-Day Dataset of Malicious HTTP Requests Blocked by OWASP ModSecurity on a Production Web Server
ISSN: 2306-5729, 2306-5729Vydáno: Basel MDPI AG 01.11.2025Vydáno v Data (Basel) (01.11.2025)“…), resulting in its inclusion in the audit log due to suspected exploitation attempts. The dataset includes attack categories such as SQL injection, cross-site scripting (XSS…”
Získat plný text
Journal Article -
12
Machine Learning Empowered Security Management and Quality of Service Provision in SDN-NFV Environment
ISSN: 1546-2226, 1546-2218, 1546-2226Vydáno: Henderson Tech Science Press 2021Vydáno v Computers, materials & continua (2021)“…With the rising demand for data access, network service providers face the challenge of growing their capital and operating costs while at the same time…”
Získat plný text
Journal Article -
13
Intelligent Anomaly Detection in Database Security: A Triple-Loop Learning Framework
Vydáno: IEEE 19.05.2025Vydáno v 2025 5th Intelligent Cybersecurity Conference (ICSC) (19.05.2025)“…), and meta-learning for real-time anomaly detection in SQL-based environments. To the best of our knowledge, TLL is the first framework to unify these three learning…”
Získat plný text
Konferenční příspěvek -
14
GENI: GANs Evaluation of iNjection attacks on IoT
ISSN: 2768-1734Vydáno: IEEE 10.11.2024Vydáno v IEEE World Forum on Internet of Things (10.11.2024)“… In this research, we tackle the challenge of detecting SQL injection attacks and propose GENI, GANs evaluation of injection attacks on IoT networks…”
Získat plný text
Konferenční příspěvek -
15
Revolutionizing Threat Hunting in Communication Networks: Introducing a Cutting-Edge Large-Scale Multiclass Dataset
ISSN: 2573-3346Vydáno: IEEE 13.08.2024Vydáno v International Conference on Information and Communication Systems (Online) (13.08.2024)“… In this paper, we develop a new threat-hunting model for communication networks and introduce a novel, cutting-edge, large-scale multiclass dataset to improve the security of network cognition…”
Získat plný text
Konferenční příspěvek -
16
Cyber Threat Attack Level Detection Using Machine Learning
Vydáno: IEEE 05.02.2025Vydáno v 2025 3rd International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT) (05.02.2025)“… The study effectively proved the ability to detect numerous attack types, such as SQL injection…”
Získat plný text
Konferenční příspěvek -
17
LNKDSEA: Machine Learning Based IoT/IIoT Attack Detection Method
Vydáno: IEEE 19.04.2023Vydáno v 2023 International Conference on Advances in Electronics, Communication, Computing and Intelligent Information Systems (ICAECIS) (19.04.2023)“…s. Practical defenses against this, including network anomaly detection, must be built to secure IoT networks…”
Získat plný text
Konferenční příspěvek -
18
Comprehensive Study of SQL Injection Attacks Mitigation Methods and Future Directions
ISSN: 3079-5354, 3079-5354Vydáno: 01.12.2025Vydáno v Journal of Cyber Security and Risk Auditing (01.12.2025)“…Structured Query Language Injection Attack (SQLIA) as a form of cyber threats are among the most dangerous, easily penetrating the databases, and most web based applications…”
Získat plný text
Journal Article -
19
Machine Learning Approach to Intrusion Detection: Performance Evaluation
ISSN: 1877-0509, 1877-0509Vydáno: Elsevier B.V 2024Vydáno v Procedia computer science (2024)“… In this paper, authors aim to build framework based on various machine learning models (ML) to capture anomaly packets…”
Získat plný text
Journal Article -
20
Identifying Security Threats in the System Using Automated Security Logs
Vydáno: IEEE 22.11.2024Vydáno v 2024 Third International Conference on Sustainable Mobility Applications, Renewables and Technology (SMART) (22.11.2024)“… Several tests like failed login, unauthorized access, Denial of Service (DOS), and SQL Injection attempts were conducted to assess the security of the login page…”
Získat plný text
Konferenční příspěvek