MJCS 2022
DOI: 10.58496/mjcs/2022/002
|View full text |Cite
|
Sign up to set email alerts
|

SQL Injection Attack Detection Using Machine Learning Algorithm

Abstract: One of the most widely recognised cyber-assaults against web-based application weaknesses is the structured query language injection attack (SQLIA), which is utilised to execute unlawful information control language, evade confirmation strategies, and access confined information. Some published systematic reviews were considered in this area. Older and more current papers in the field are often included in more recent systematic reviews. As a result, all of the publications we looked at were recent. I used dat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 17 publications
0
6
0
Order By: Relevance
“…The field of cybersecurity contributes to designing a digital environment free of loopholes and not allowing unauthorized persons to enter this environment. These mechanisms can only be achieved with artificial intelligence techniques that play an influential role in changing and controlling cyber-attacks [20][21][22][23][24][25]. Therefore, the existence of artificial intelligence and effective cybersecurity measures lead to the establishment of a proper digital environment [26][27][28][29][30][31].…”
Section: Cybersecurity Practicesmentioning
confidence: 99%
“…The field of cybersecurity contributes to designing a digital environment free of loopholes and not allowing unauthorized persons to enter this environment. These mechanisms can only be achieved with artificial intelligence techniques that play an influential role in changing and controlling cyber-attacks [20][21][22][23][24][25]. Therefore, the existence of artificial intelligence and effective cybersecurity measures lead to the establishment of a proper digital environment [26][27][28][29][30][31].…”
Section: Cybersecurity Practicesmentioning
confidence: 99%
“…However, deep learning measures the performance of systems in addressing a problem, whether the examples are one-or multi-dimensional. Scholars are actively trying to find solutions to many issues in the field of cybersecurity by using deep learning methods [85][86][87]. These methods obtain a very high accuracy of more than 97% in identifying attack messages and blocking their display on vehicle screens.…”
Section: Deep Learning In Cybersecuritymentioning
confidence: 99%
“…Machine learning algorithms, including both classic and deep learning models, are used to analyze and identify security vulnerabilities by evaluating input validation features. SQL injection attacks (SQLIA), which are widely recognized as one of the most common and dangerous cyber assaults on web-based applications.For that, the authors of the study [6] focused on reviewing various techniques and systems for detecting and preventing SQLIA, including encryption, XML, design matching, parsing, and machine learning. The study evaluates the performance of different machine learning algorithms, including Logistic Regression (LRN), Stochastic Gradient Descent (SDG), Sequential Minimal Optimization (SMO), Bayes Network (BNK), Instance-Based Learner (IBK), Multilayer Perceptron (MLP), Naive Bayes (NBS), and J48.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Confidentiality, integrity and availability considered as the safety valve in web applications. So, any focus on website functionality rather than security will cause susceptibilities in the web application, which allow the attacker to access unauthorized data [11], any stolen data will lose of confidentiality, any ability to modified in an unexpected data will lose integrity, and also Loss of availability takes place when denial of service is caused by an attacker.Based on OWASP's compilation of the top 10 web application attacks from 2013 to 2021, SQL injection remains the most prevalent type of attack targeting websites [6]. To avoid and mitigate SQL injection attacks, [9] we must know how it works and the different ways available to implement the SQL injection attack?…”
Section: Sql Injection Attacks-overviewmentioning
confidence: 99%