2021 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE) 2021
DOI: 10.1109/iccike51210.2021.9410675
|View full text |Cite
|
Sign up to set email alerts
|

A CNN-BiLSTM based Approach for Detection of SQL Injection Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(10 citation statements)
references
References 19 publications
0
10
0
Order By: Relevance
“…AdaBoost stands for adaptive boosting, which is a statistical classification technique, and the deep forest model is a layered model based on a deep neural network. The adaptive deep forest model proposed in [25] achieved high efficiency, comparable to that of traditional ML models, such as decision trees, and better performance compared with regular deep neural network models, such as RNN and CNN.…”
Section: Acknowledgementsmentioning
confidence: 99%
See 1 more Smart Citation
“…AdaBoost stands for adaptive boosting, which is a statistical classification technique, and the deep forest model is a layered model based on a deep neural network. The adaptive deep forest model proposed in [25] achieved high efficiency, comparable to that of traditional ML models, such as decision trees, and better performance compared with regular deep neural network models, such as RNN and CNN.…”
Section: Acknowledgementsmentioning
confidence: 99%
“…The authors of [25] have proposed a hybrid CNN-BiLSTM-based model for SQLI attack detection. The authors presented a detailed comparative analysis of different types of ML techniques used for the detection of SQLI attacks.…”
Section: Acknowledgementsmentioning
confidence: 99%
“…Their model also utilizes a multilayer LSTM structure. Deploying two LSTMs, researchers [131]- [133] all uses a bidirectional LSTM (BiLSTM). For instance, Gandhi et al [131] presented a hybrid module based on CNN combined with BiLSTM.…”
Section: ) Sql Injectionmentioning
confidence: 99%
“…Deploying two LSTMs, researchers [131]- [133] all uses a bidirectional LSTM (BiLSTM). For instance, Gandhi et al [131] presented a hybrid module based on CNN combined with BiLSTM. Wen et al [132] enhanced the BiLSTM model for SQL attack detection by adding an attention mechanism.…”
Section: ) Sql Injectionmentioning
confidence: 99%
“…This may create the system crashes, corrupted data and other harmful effects. [5] Illegitimate Access: Hackers can enter to the web applications and the control panels and the web applications by passing the systems authentication which permits them to control the programs and initiate the attacks on different individuals or companies. [15] Elevated Privileges: In speci c cases, malicious actors can raise the honors inside a weak dataset or database which can be able to ruin the whole system.…”
Section: Introductionmentioning
confidence: 99%