A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
SQL injection detection for web applications based on Elastic-Pooling CNN
2019
IEEE Access
Based on the irregular matching characteristics, it can identify new attacks and is harder to bypass. INDEX TERMS Deep learning, neural network, CNN, network security, SQL injection. ...
This paper presents a method of SQL injection detection based on Elastic-Pooling CNN (EP-CNN) and compares it with traditional detection methods. ...
Based on the above four ideas and with data preprocessing techniques, we can accurately identify the behavior of SQL injection through query statements.
B. ...
doi:10.1109/access.2019.2947527
fatcat:fitsodxbcrgorcr53pe6vphyjm
DeepHTTP: Anomalous HTTP Traffic Detection and Malicious Pattern Mining Based on Deep Learning
[chapter]
2020
Communications in Computer and Information Science
In this work, we propose DeepHTTP, an HTTP traffic detection framework based on deep learning. ...
Unlike previous studies, this framework not only performs malicious traffic detection but also uses the deep learning model to mine malicious fields of the traffic payload. ...
.), SQL Injection (Union Select SQL Injection, Error-based SQL Injection, Blind SQL Injection, etc.), Cross-Site Scripting (DOM-based XSS, Reflected XSS, and Stored XSS), WebShell (Big Trojan, Small Trojan ...
doi:10.1007/978-981-33-4922-3_11
fatcat:jffot3q6bncatetvnna6on24xy
A survey on network intrusion detection system techniques
2018
International Journal of Advanced Technology and Engineering Exploration
An SQL Injection detection using query transformation and document similarity (IDS-SQLiDDS) is proposed for detecting various kinds of SQL injection attacks. ...
In [24] built a flexible and effective NIDS using a deep learning based approach. ...
doi:10.19101/ijatee.2018.546013
fatcat:lr6uh7abmrb6ppxwxhixpof57m
Guest Editorial: Introduction to the Special Section on Machine Learning-Based Internet of Vehicles: Theory, Methodology, and Applications
2019
IEEE Transactions on Vehicular Technology
In order to solve this problem, Li et al. propose a LSTM-based SQL injection attack detection method in the article "LSTM-Based SQL Injection Detection Method for Intelligent Transportation System," which ...
In addition, they propose an injection samples generation method based on communication attack behaviors analysis. ...
doi:10.1109/tvt.2019.2914747
fatcat:rrpckr7cczfdzmqy7nkbcnsdua
The Overview of Database Security Threats' Solutions: Traditional and Machine Learning
2021
Journal of Information Security
When using machine learning to deal with database security threats, the idea of ensemble learning is reasonable, better classification results can be obtained by using AdaBoost algorithm. ...
Compared with the traditional and machine learning (ML) methods, some explanations of concepts are interspersed to make these methods easier to understand. ...
Machine learning specific methods are also used to resist SQL attacks. Hu et al. [55] utilized vulnerability mining methods to solve the problem of SQL injection. ...
doi:10.4236/jis.2021.121002
fatcat:qrvje6sv7rbfrhgevewy4gyxom
SQL Injection Detection Tools Advantages and Drawbacks
2021
International Journal of Wireless and Microwave Technologies
SQL injection attack is a major threat to web application security. It has been rated as one of the most dangerous vulnerabilities for a web-based application. ...
We aim in this paper to give an overview of the SQL injection (SQLI) attack and classify these attacks and prevention and detection tools. ...
java Artificial Neural Network-based web application firewall for SQL injection ...
doi:10.5815/ijwmt.2021.03.03
fatcat:psnvvzeb5bhzlbbbrns3pgcifm
A Survey on: Detection from Attacks on Web Application using IDS Approaches
2019
International Journal of Computer Applications
Moreover, Accompanying some of the helpful techniques which are quite helpful in classifying behaviors, which are often costly as well as robust for production, require large information for bedtime and ...
In Laterin Injection, the PL/SQL system can deal with harmful attacks so that even client input does not happen. ...
In the wake of emptying the properties, SQL inquiries become autonomous, connecting this strategy to any database. 2) SQLStor: Block or Stored Procedure SQL Injection Attack with Dynamic Query Structure ...
doi:10.5120/ijca2019919299
fatcat:cl6hsvigdzdqdfdkvjuoahejjq
A Learning-Based Approach to the Detection of SQL Attacks
[chapter]
2005
Lecture Notes in Computer Science
We have developed an anomaly-based system that learns the profiles of the normal database access performed by web-based applications using a number of different models. ...
In addition, our solution represents an improvement with respect to previous approaches because it reduces the possibility of executing SQL-based mimicry attacks. ...
Various types of learning-based anomaly detection techniques have been proposed to analyze different data streams. A common approach is to use data-mining techniques to characterize network traffic. ...
doi:10.1007/11506881_8
fatcat:74spjju25vdzpa6i2hhrpen6cy
Real Time Detection Framework of Insider Threat Based Agent
2018
DEStech Transactions on Computer Science and Engineering
A real time detection framework based on agent is proposed, and malicious insider threats are identified by comparing user identity and abnormal operation behavior. ...
In view of the increasing internal threat behavior of enterprise information system, especially the internal user data corruption. ...
, then analyzed the SQL statement intention, first check the sensitive words, avoid SQL injection, cross site scripting attack. ...
doi:10.12783/dtcse/cmee2017/20071
fatcat:3uhik3kiozfu7kj654voeeyhgy
An Intrusion Detection Model based on a Convolutional Neural Network
2019
Journal of multimedia information system
Traditional rule-based security solutions are vulnerable to advanced attacks due to unpredictable behaviors and unknown vulnerabilities. ...
We employ deep-learning techniques and develop a convolutional neural network (CNN) model for CSE-CIC-IDS 2018. We then evaluate its performance comparing with a recurrent neural network (RNN) model. ...
Beghdad [4] classifies normal and malicious traffic based on SVM and then detect attacks based on Decision Tree. Numerous studies employ deep-learning (DL) for intrusion detects. ...
doi:10.33851/jmis.2019.6.4.165
fatcat:7uowidyjlfhcxkzsglq3frizsq
Real Time face-mask detection with Arduino to prevent spreading of COVID-19
2020
Qubahan Academic Journal
Face-mask detection had been significant progress in the Image processing and deep learning fields studies. Many face detection models have been designed using different algorithms and techniques. ...
Mall, University, Office, ...etc.) by detecting face mask using deep learning, TensorFlow, Keras, and OpenCV and sending a signal to Arduino device that connected to the gate to be open. it detect a face ...
They proposed a cloud-based deep unsupervised learning optimization algorithm was proposed. ...
doi:10.48161/qaj.v1n2a47
fatcat:lyewf735drdrxg675pvud7emuq
A Hybrid System of Deep Learning and Learning Classifier System for Database Intrusion Detection
[chapter]
2017
Lecture Notes in Computer Science
CNN, one of the deep learning methods for image and pattern classification, classifies the queries by modeling normal behaviors of database. ...
LCS, one of the adapted heuristic search algorithms based on genetic algorithm, discovers new rules to detect abnormal behaviors to supplement the CNN. ...
Convolutional neural network, one of the deep learning methods for image and pattern classification [8] , is used for modeling normal behaviors of database queries. ...
doi:10.1007/978-3-319-59650-1_52
fatcat:qyqhfcmisfgzjnv4p4tcltkvd4
Web and Database Security
[chapter]
2012
Security Enhanced Applications for Information Systems
In recent years, adding AJAX elements in sites has become a very popular trend, and most websites are typical AJAX-based applications. ...
So people start to pay attention to the the data mining method owning the learning ability. ...
SQL inject
SQL Inject Principle SQL Inject refers that the attackers deceive database server to execute unauthorized wilful inquire and illegal operation through adding extra SQL statement element to ...
doi:10.5772/36174
fatcat:h4vmvfsg5rc7pcx7qwzosb3hv4
Comprehensive Survey of Big Data Mining Approaches in Cloud Systems
2021
Qubahan Academic Journal
In this paper, we research Big Data Mining Approaches in Cloud Systems and address cloud-compatible problems and computing techniques to promote Big Data Mining in Cloud Systems. ...
Cloud computing, data mining, and big online data are discussed in this paper as hybridization possibilities. ...
They proposed a cloud-based deep unsupervised learning optimization algorithm was proposed. ...
doi:10.48161/qaj.v1n2a46
fatcat:hjfg6tuckjdd5ljfdybjvk3k3q
A Survey on Detection and Prevention of Web Vulnerabilities
2020
International Journal of Advanced Computer Science and Applications
Different methods comprising secure programming, static, Dynamic, Hybrid analysis, and machine learning classify the data from articles. ...
Fig. 7 . 7 Machine Learning-based Vulnerability Analysis. ...
The entropy of each SQL statement is calculated based on the tokens probability. ...
doi:10.14569/ijacsa.2020.0110665
fatcat:ltyoh3bjpfhrfelvi5pp5s4ana
« Previous
Showing results 1 — 15 out of 825 results