2016
DOI: 10.1007/s11277-016-3741-7
|View full text |Cite
|
Sign up to set email alerts
|

A Countermeasure to SQL Injection Attack for Cloud Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 18 publications
(6 citation statements)
references
References 26 publications
0
6
0
Order By: Relevance
“…Using the KDD99 dataset, the authors of [ 45 ] present and evaluate a hierarchical IDS that employs ML and knowledge-based techniques. In [ 46 ], the authors investigated the performance of several ML models, including the RF and gradient-boosting machines, in practical IoT environments. Data-poisoning assaults were simulated by modifying the training data of the datasets using a stochastic algorithm so that the analysis could be carried out.…”
Section: Related Work and Literature Reviewmentioning
confidence: 99%
“…Using the KDD99 dataset, the authors of [ 45 ] present and evaluate a hierarchical IDS that employs ML and knowledge-based techniques. In [ 46 ], the authors investigated the performance of several ML models, including the RF and gradient-boosting machines, in practical IoT environments. Data-poisoning assaults were simulated by modifying the training data of the datasets using a stochastic algorithm so that the analysis could be carried out.…”
Section: Related Work and Literature Reviewmentioning
confidence: 99%
“…1.6 × 10 +1 9.1 × 10 −5 0.0 × 10 +0 0.0 × 10 +0 9.4 × 10 +2 1.6 × 10 −2 9.4 × 10 +2 1.6 × 10 −2 2.0 × 10 +0 2.9 × 10 −5 f 2-39 7.4 × 10 +1 4.2 × 10 −4 4.8 × 10 +1 6.4 × 10 −4 7.1 × 10 +1 1.2 × 10 −3 7.0 × 10 +1 1.2 × 10 −3 4.8 × 10 +1 7.0 × 10 −4 f 2- 40 3.3 × 10 +3 1.9 × 10 −2 7.7 × 10 +1 1.0 × 10 −3 1.3 × 10 +2 2.3 × 10 −3 1.2 × 10 +2 2.2 × 10 −3 7.2 × 10 +1 1.0 × 10 −3 f 2- 41 3.0 × 10 +3 1.7 × 10 −2 3.3 × 10 +2 4.5 × 10 −3 2.3 × 10 +3 3.9 × 10 −2 2.3 × 10 +3 3.9 × 10 −2 2.0 × 10 +3 3.0 × 10 −2 f 2-42 2.7 × 10 +3 1.5 × 10 −2 2.7 × 10 +3 3.7 × 10 −2 2.7 × 10 +3 4.7 × 10 −2 2.7 × 10 +3 4.7 × 10 −2 2.7 × 10 +3 4.0 × 10 −2 3.6 × 10 +4 4.0 × 10 −1 4.2 × 10 +4 4.4 × 10 −1 3.6 × 10 +4 5.5 × 10 −1 4.3 × 10 +4 7.6 × 10 −1 5.1 × 10 +4 9.1 × 10 −1 f 2-10…”
Section: Featurementioning
confidence: 99%
“…It is essential to address that the KDD99 and UNSW-NB15 datasets do not contain attacks related to the cloud computing, such as the SQL injection. Reference [41] proposed a countermeasure to detect these attacks, specifically in the cloud environment. The method in Reference [41] can be applied to the cloud environment, without the need for an application's source code.…”
Section: Introductionmentioning
confidence: 99%
“…e researchers also introduced a cryptographic mechanism to ensure the confidentiality and integrity of the data in the WSN and achieved encouraging results [19]. Literature [20] proposed a detection scheme for SQL injection attacks, which does not require access to the source code of the application, so it can be directly applied to the cloud environment. Literature [21] proposed a certificate-based aggregate signature scheme in WSN, which can resist forgery attacks.…”
Section: Introductionmentioning
confidence: 99%