Proceedings of the ACMSE 2018 Conference 2018
DOI: 10.1145/3190645.3190670
|View full text |Cite
|
Sign up to set email alerts
|

Multi-source data analysis and evaluation of machine learning techniques for SQL injection detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(10 citation statements)
references
References 8 publications
0
10
0
Order By: Relevance
“…In this subsection, we conduct extensive simulations to illustrate how to adjust the complexity of security schemes by using the proposed solution. Two existing security schemes against DDoS attack [18] and malware injection attack [24] are applied in this case study. We present the performance of the two schemes before and after feature selection to validate the effectiveness of our proposed solution to address security-energy tradeoff.…”
Section: Simulation Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…In this subsection, we conduct extensive simulations to illustrate how to adjust the complexity of security schemes by using the proposed solution. Two existing security schemes against DDoS attack [18] and malware injection attack [24] are applied in this case study. We present the performance of the two schemes before and after feature selection to validate the effectiveness of our proposed solution to address security-energy tradeoff.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…Through the feature selection performed by the proposed solution, different tradeoffs between security and energy can be reached depending on the demands of IoT applications. After feature selection, the state-of-art security schemes [18,24] are applied against DDoS attack and malware injection attack, respectively. Figure 6 presents performances of two schemes with different numbers of selected features, where the balanced accuracy reflects the security level and computational time reflects the energy consumption.…”
Section: Simulation Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The library Accord.NET is often used in research into the application of machine learning algorithms [15,16], including the studies into similar topics [17,19]. The closest analogs to this library are the commercially-available suite MATLAB, the R language implementation, as well as the free library scikit-learn.…”
Section: Results Of Numerical Experiments On Estimating the Effectivementioning
confidence: 99%
“…Consequently, without additional transformations, the logically interrelated attributes would be considered independent of each other. Such a simplification would reduce the generalizing capacity of the algorithm, as well as increase the costs of keeping a forest and the complexity of its construction [17]. To resolve this task, the modifications to the original method are proposed.…”
Section: T T T T T Tmentioning
confidence: 99%