Approach to detecting SQL injection behaviors in network environment
SQL injection attack is one of the main threats that many Web applications faced with. The traditional detection method depended on the clients or servers. Firstly the process of SQL injection attack was analyzed, and then the differences between attack traffic and normal traffic HTTP request length...
Saved in:
Main Authors: | Yu-fei ZHAO, Gang XIONG, Long-tao HE, Zhou-jun LI |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2016-02-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016034/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Research on the SQL injection filtering based on SQL syntax tree
by: Chen-wang HAN, et al.
Published: (2016-11-01) -
SQL Injection Detection Based on Lightweight Multi-Head Self-Attention
by: Rui-Teng Lo, et al.
Published: (2025-01-01) -
SQLMVED: SQL injection runtime prevention system based on multi-variant execution
by: Bolin MA, et al.
Published: (2021-04-01) -
Penetration test method using blind SQL injection based on second-order fragment and reassembly
by: De-guang LE, et al.
Published: (2017-10-01) -
WEB VULNERABILITIES DETECTION USING A HYBRID MODEL OF CNN, GRU AND ATTENTION MECHANISM
by: Sarbast H. Ali, et al.
Published: (2025-01-01)