2021
DOI: 10.1016/j.jisa.2021.102852
|View full text |Cite
|
Sign up to set email alerts
|

An ensemble classification-based approach to detect attack level of SQL injections

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0
2

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 20 publications
(13 citation statements)
references
References 6 publications
0
11
0
2
Order By: Relevance
“…Supervised Learning Methods: Support Vector Machines (SVM), Random Forests, and Neural Networks are some examples of supervised learning algorithms that have been used in projects. [3][4] These models were trained on labeled datasets to figure out whether a query was normal or malicious. Unsupervised learning approaches: There's also work involving unsupervised learning to detect anomalous query patterns without needing labeled data, using clustering techniques and anomaly detection algorithms like the Isolation Forest.…”
Section: Methodsmentioning
confidence: 99%
“…Supervised Learning Methods: Support Vector Machines (SVM), Random Forests, and Neural Networks are some examples of supervised learning algorithms that have been used in projects. [3][4] These models were trained on labeled datasets to figure out whether a query was normal or malicious. Unsupervised learning approaches: There's also work involving unsupervised learning to detect anomalous query patterns without needing labeled data, using clustering techniques and anomaly detection algorithms like the Isolation Forest.…”
Section: Methodsmentioning
confidence: 99%
“…The discoveries of their appraisal uncovered that instead of evaluating the viability of current SQLIA identification methods, most of scholastics focused on proposing components to identify and moderate SQL injection attacks (SQLIAs). An instrument to distinguish deceitful SQL inquiries was created by Kasim [13]. For the order systems to find different levels of SQL injection, choice tree techniques were used.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The author of [37] has designed a method to detect malicious SQL queries. The DT technique was used for the classification processes to detect different levels of SQLI.…”
Section: Related Workmentioning
confidence: 99%