2017 Computing Conference 2017
DOI: 10.1109/sai.2017.8252192
|View full text |Cite
|
Sign up to set email alerts
|

A hybrid method for detection and prevention of SQL injection attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(19 citation statements)
references
References 8 publications
0
19
0
Order By: Relevance
“…The papers [24][25][26][27][28][29][30][31][32] use pattern matching approaches to detect and prevent SQLi attacks. These operations are performed at the runtime, which makes these practices time-consuming and complex.…”
Section: Pattern Matching Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…The papers [24][25][26][27][28][29][30][31][32] use pattern matching approaches to detect and prevent SQLi attacks. These operations are performed at the runtime, which makes these practices time-consuming and complex.…”
Section: Pattern Matching Approachesmentioning
confidence: 99%
“…There are numerous SQLi detection approaches to diminish such attacks through SQLi vulnerability exploitation. These detection approaches can be of various types: detection using pattern matching [24][25][26][27][28][29][30][31][32], learning-based detection [33][34][35][36][37][38][39][40][41][42][43], and other approaches [44][45][46][47][48][49].…”
Section: Introductionmentioning
confidence: 99%
“…This phase is the previous method for detection SQLIA proposed by Ghafarian [16] which is combined between static and dynamic analysis method. Firstly, it suggested to insert a record at every table of the database that has only Symbols.…”
Section: Phase I: Datasetmentioning
confidence: 99%
“…Hidden Markov Model (HMM) [16] detects SQL injection by establishing the browsing behavior model of attackers and legitimate users, and has common shortcomings with the detection method based on user behavior [12], [13], which is more suitable for the detection of a single website. The database table is expanded [17] or redesigned to monitor the query behavior of the database to determine whether it belongs to abnormal behavior. This method can handle any type of query and the algorithm is platform-independent.…”
Section: Figurementioning
confidence: 99%