2019
DOI: 10.1109/access.2019.2947527
|View full text |Cite
|
Sign up to set email alerts
|

SQL Injection Detection for Web Applications Based on Elastic-Pooling CNN

Abstract: An enterprise's data can be one of its most important assets and often critical to the firm's development and survival. SQL injection attack is ranked first in the top ten risks to network applications by the Open Web Application Security Project (OWASP). Its harmfulness, universality, and severe situation are self-evident. This paper presents a method of SQL injection detection based on Elastic-Pooling CNN (EP-CNN) and compares it with traditional detection methods. This method can output a fixed two-dimensio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 42 publications
(10 citation statements)
references
References 20 publications
(42 reference statements)
0
9
0
1
Order By: Relevance
“…The authors proposed an attack detection method based on elastic grouping; implementing the method provided greater security according to the different detection methods; the method helped eliminate redundant information in the system, early detection of the attack provided an accuracy of the behavior of attackers; as a result, an automatic behavioral analysis was obtained, identifying the traffic of the attack [43].…”
Section: A Materialsmentioning
confidence: 99%
“…The authors proposed an attack detection method based on elastic grouping; implementing the method provided greater security according to the different detection methods; the method helped eliminate redundant information in the system, early detection of the attack provided an accuracy of the behavior of attackers; as a result, an automatic behavioral analysis was obtained, identifying the traffic of the attack [43].…”
Section: A Materialsmentioning
confidence: 99%
“…It becomes increasingly dangerous when an attacker gains access to the data and performs unauthorized data modifications [4,5]. SQLi is performed by inserting SQL commands into web forms, domain names, or page queries and ultimately tricks the server into running malicious SQL commands, causing significant damage to websites and users [6]. XSS occurs when a malicious web code is sent, typically in the form of a script via a browser on the victim's computer.…”
Section: Introductionmentioning
confidence: 99%
“…Specifically, this science works in the search, analysis, identification, and categorization of data that can be crime evidence [Garfinkel 2010;van Beek et al 2020]. For example, Digital Forensics may be used for preventing and detecting SQL Injection attacks [Xie et al 2019].…”
Section: Introductionmentioning
confidence: 99%