Filters








825 Hits in 3.3 sec

SQL injection detection for web applications based on Elastic-Pooling CNN

Xin Xie, Chunhui Ren, Yusheng Fu, Jie Xu, Jinhong Guo
2019 IEEE Access  
Based on the irregular matching characteristics, it can identify new attacks and is harder to bypass. INDEX TERMS Deep learning, neural network, CNN, network security, SQL injection.  ...  This paper presents a method of SQL injection detection based on Elastic-Pooling CNN (EP-CNN) and compares it with traditional detection methods.  ...  Based on the above four ideas and with data preprocessing techniques, we can accurately identify the behavior of SQL injection through query statements. B.  ... 
doi:10.1109/access.2019.2947527 fatcat:fitsodxbcrgorcr53pe6vphyjm

DeepHTTP: Anomalous HTTP Traffic Detection and Malicious Pattern Mining Based on Deep Learning [chapter]

Yuqi Yu, Hanbing Yan, Yuan Ma, Hao Zhou, Hongchao Guan
2020 Communications in Computer and Information Science  
In this work, we propose DeepHTTP, an HTTP traffic detection framework based on deep learning.  ...  Unlike previous studies, this framework not only performs malicious traffic detection but also uses the deep learning model to mine malicious fields of the traffic payload.  ...  .), SQL Injection (Union Select SQL Injection, Error-based SQL Injection, Blind SQL Injection, etc.), Cross-Site Scripting (DOM-based XSS, Reflected XSS, and Stored XSS), WebShell (Big Trojan, Small Trojan  ... 
doi:10.1007/978-981-33-4922-3_11 fatcat:jffot3q6bncatetvnna6on24xy

A survey on network intrusion detection system techniques

K. Nandha Kumar, S. Sukumaran
2018 International Journal of Advanced Technology and Engineering Exploration  
An SQL Injection detection using query transformation and document similarity (IDS-SQLiDDS) is proposed for detecting various kinds of SQL injection attacks.  ...  In [24] built a flexible and effective NIDS using a deep learning based approach.  ... 
doi:10.19101/ijatee.2018.546013 fatcat:lr6uh7abmrb6ppxwxhixpof57m

Guest Editorial: Introduction to the Special Section on Machine Learning-Based Internet of Vehicles: Theory, Methodology, and Applications

Jun Guo, Sunwoo Kim, Henk Wymeersch, Walid Saad, Wei Chen
2019 IEEE Transactions on Vehicular Technology  
In order to solve this problem, Li et al. propose a LSTM-based SQL injection attack detection method in the article "LSTM-Based SQL Injection Detection Method for Intelligent Transportation System," which  ...  In addition, they propose an injection samples generation method based on communication attack behaviors analysis.  ... 
doi:10.1109/tvt.2019.2914747 fatcat:rrpckr7cczfdzmqy7nkbcnsdua

The Overview of Database Security Threats' Solutions: Traditional and Machine Learning

Yong Wang, Jinsong Xi, Tong Cheng
2021 Journal of Information Security  
When using machine learning to deal with database security threats, the idea of ensemble learning is reasonable, better classification results can be obtained by using AdaBoost algorithm.  ...  Compared with the traditional and machine learning (ML) methods, some explanations of concepts are interspersed to make these methods easier to understand.  ...  Machine learning specific methods are also used to resist SQL attacks. Hu et al. [55] utilized vulnerability mining methods to solve the problem of SQL injection.  ... 
doi:10.4236/jis.2021.121002 fatcat:qrvje6sv7rbfrhgevewy4gyxom

SQL Injection Detection Tools Advantages and Drawbacks

Hazem M. Harb, Palestine Technical University, Kadoorie, Derar Eleyan, Amna Eleyan
2021 International Journal of Wireless and Microwave Technologies  
SQL injection attack is a major threat to web application security. It has been rated as one of the most dangerous vulnerabilities for a web-based application.  ...  We aim in this paper to give an overview of the SQL injection (SQLI) attack and classify these attacks and prevention and detection tools.  ...  java Artificial Neural Network-based web application firewall for SQL injection  ... 
doi:10.5815/ijwmt.2021.03.03 fatcat:psnvvzeb5bhzlbbbrns3pgcifm

A Survey on: Detection from Attacks on Web Application using IDS Approaches

Radha Rashmi, Amit Saxena
2019 International Journal of Computer Applications  
Moreover, Accompanying some of the helpful techniques which are quite helpful in classifying behaviors, which are often costly as well as robust for production, require large information for bedtime and  ...  In Laterin Injection, the PL/SQL system can deal with harmful attacks so that even client input does not happen.  ...  In the wake of emptying the properties, SQL inquiries become autonomous, connecting this strategy to any database. 2) SQLStor: Block or Stored Procedure SQL Injection Attack with Dynamic Query Structure  ... 
doi:10.5120/ijca2019919299 fatcat:cl6hsvigdzdqdfdkvjuoahejjq

A Learning-Based Approach to the Detection of SQL Attacks [chapter]

Fredrik Valeur, Darren Mutz, Giovanni Vigna
2005 Lecture Notes in Computer Science  
We have developed an anomaly-based system that learns the profiles of the normal database access performed by web-based applications using a number of different models.  ...  In addition, our solution represents an improvement with respect to previous approaches because it reduces the possibility of executing SQL-based mimicry attacks.  ...  Various types of learning-based anomaly detection techniques have been proposed to analyze different data streams. A common approach is to use data-mining techniques to characterize network traffic.  ... 
doi:10.1007/11506881_8 fatcat:74spjju25vdzpa6i2hhrpen6cy

Real Time Detection Framework of Insider Threat Based Agent

Zhen-hui WANG
2018 DEStech Transactions on Computer Science and Engineering  
A real time detection framework based on agent is proposed, and malicious insider threats are identified by comparing user identity and abnormal operation behavior.  ...  In view of the increasing internal threat behavior of enterprise information system, especially the internal user data corruption.  ...  , then analyzed the SQL statement intention, first check the sensitive words, avoid SQL injection, cross site scripting attack.  ... 
doi:10.12783/dtcse/cmee2017/20071 fatcat:3uhik3kiozfu7kj654voeeyhgy

An Intrusion Detection Model based on a Convolutional Neural Network

Jiyeon Kim, Yulim Shin, Eunjung Choi
2019 Journal of multimedia information system  
Traditional rule-based security solutions are vulnerable to advanced attacks due to unpredictable behaviors and unknown vulnerabilities.  ...  We employ deep-learning techniques and develop a convolutional neural network (CNN) model for CSE-CIC-IDS 2018. We then evaluate its performance comparing with a recurrent neural network (RNN) model.  ...  Beghdad [4] classifies normal and malicious traffic based on SVM and then detect attacks based on Decision Tree. Numerous studies employ deep-learning (DL) for intrusion detects.  ... 
doi:10.33851/jmis.2019.6.4.165 fatcat:7uowidyjlfhcxkzsglq3frizsq

Real Time face-mask detection with Arduino to prevent spreading of COVID-19

Saman M. Almufti, Ridwan B. Marqas, Zakiya A. Nayef, Tamara S. Mohamed
2020 Qubahan Academic Journal  
Face-mask detection had been significant progress in the Image processing and deep learning fields studies. Many face detection models have been designed using different algorithms and techniques.  ...  Mall, University, Office, ...etc.) by detecting face mask using deep learning, TensorFlow, Keras, and OpenCV and sending a signal to Arduino device that connected to the gate to be open. it detect a face  ...  They proposed a cloud-based deep unsupervised learning optimization algorithm was proposed.  ... 
doi:10.48161/qaj.v1n2a47 fatcat:lyewf735drdrxg675pvud7emuq

A Hybrid System of Deep Learning and Learning Classifier System for Database Intrusion Detection [chapter]

Seok-Jun Bu, Sung-Bae Cho
2017 Lecture Notes in Computer Science  
CNN, one of the deep learning methods for image and pattern classification, classifies the queries by modeling normal behaviors of database.  ...  LCS, one of the adapted heuristic search algorithms based on genetic algorithm, discovers new rules to detect abnormal behaviors to supplement the CNN.  ...  Convolutional neural network, one of the deep learning methods for image and pattern classification [8] , is used for modeling normal behaviors of database queries.  ... 
doi:10.1007/978-3-319-59650-1_52 fatcat:qyqhfcmisfgzjnv4p4tcltkvd4

Web and Database Security [chapter]

Jiping Xiong, Lifeng Xuan, Jian Zhao, Tao Huang
2012 Security Enhanced Applications for Information Systems  
In recent years, adding AJAX elements in sites has become a very popular trend, and most websites are typical AJAX-based applications.  ...  So people start to pay attention to the the data mining method owning the learning ability.  ...  SQL inject SQL Inject Principle SQL Inject refers that the attackers deceive database server to execute unauthorized wilful inquire and illegal operation through adding extra SQL statement element to  ... 
doi:10.5772/36174 fatcat:h4vmvfsg5rc7pcx7qwzosb3hv4

Comprehensive Survey of Big Data Mining Approaches in Cloud Systems

Zainab Salih Ageed, Subhi R. M. Zeebaree, Mohammed Mohammed Sadeeq, Shakir Fattah Kak, Hazha Saeed Yahia, Mayyadah R. Mahmood, Ibrahim Mahmood Ibrahim
2021 Qubahan Academic Journal  
In this paper, we research Big Data Mining Approaches in Cloud Systems and address cloud-compatible problems and computing techniques to promote Big Data Mining in Cloud Systems.  ...  Cloud computing, data mining, and big online data are discussed in this paper as hybridization possibilities.  ...  They proposed a cloud-based deep unsupervised learning optimization algorithm was proposed.  ... 
doi:10.48161/qaj.v1n2a46 fatcat:hjfg6tuckjdd5ljfdybjvk3k3q

A Survey on Detection and Prevention of Web Vulnerabilities

Muhammad Noman, Muhammad Iqbal, Amir Manzoor
2020 International Journal of Advanced Computer Science and Applications  
Different methods comprising secure programming, static, Dynamic, Hybrid analysis, and machine learning classify the data from articles.  ...  Fig. 7 . 7 Machine Learning-based Vulnerability Analysis.  ...  The entropy of each SQL statement is calculated based on the tokens probability.  ... 
doi:10.14569/ijacsa.2020.0110665 fatcat:ltyoh3bjpfhrfelvi5pp5s4ana
« Previous Showing results 1 — 15 out of 825 results