2021 International Conference on Information Technology (ICIT) 2021
DOI: 10.1109/icit52682.2021.9491117
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on SQL Injection Attack: Detection and Challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
3
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(6 citation statements)
references
References 18 publications
0
3
0
1
Order By: Relevance
“…Related works [26,31] have conducted many studies on traditional machine learning detection methods. Kamtuo et al [20] proposed a framework for SQLIA prevention using a compiler platform and machine learning.…”
Section: Machine Learning-based Detection Methodsmentioning
confidence: 99%
“…Related works [26,31] have conducted many studies on traditional machine learning detection methods. Kamtuo et al [20] proposed a framework for SQLIA prevention using a compiler platform and machine learning.…”
Section: Machine Learning-based Detection Methodsmentioning
confidence: 99%
“…If the classifier is active, it will block data from reaching the database server; if it is passive, it will inform the administrator. Accordingly, three alternative learning techniques have been used to train the classifier to recognize and detect SQLI attacks [2,22].…”
Section: Introductionmentioning
confidence: 99%
“…When data are unclassified, it is unclear if they are normal or abnormal (malicious). The UL can make use of a variety of methods, including clustering and density estimation [2,22].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…2. Ataques de injec ¸ão SQL [Marashdeh et al 2021] afirma que o termo injec ¸ão SQL compreende um tipo de ataque que permite que usuários obtenham acesso não autorizado a bases de dados através da injec ¸ão de código em conjunto de uma query SQL. Esse tipo de ataque pode ser executado facilmente em qualquer formulário de login, cadastro, ou campo de busca.…”
Section: Introduc ¸ãOunclassified