Approach to detecting SQL injection behaviors in network environment
SQL injection attack is one of the main threats that many Web applications faced with. The traditional detection method depended on the clients or servers. Firstly the process of SQL injection attack was analyzed, and then the differences between attack traffic and normal traffic HTTP request length...
Saved in:
| Main Authors: | Yu-fei ZHAO, Gang XIONG, Long-tao HE, Zhou-jun LI |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Editorial Department of Journal on Communications
2016-02-01
|
| Series: | Tongxin xuebao |
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016034/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
A Systematic Literature Review on SQL Injection Attacks
by: Maryam Mehmood, et al.
Published: (2024-02-01) -
A WEB-APPLICATION QUALITY ASSESSMENT MODEL BASED ON SQL-INJECTION VULNERABILITY DETECTION
by: D. E. Onoshko, et al.
Published: (2019-06-01) -
Critical Evaluation of SQL Injection Security Measures in Web Applications
by: Haneen mohammed adhab Al salmawi
Published: (2025-03-01) -
Kombinasi AES dan HMAC SHA-256 untuk Pengamanan Parameter URL dari Serangan SQL Injection
by: Gagan Akhmad Fauzi, et al.
Published: (2025-06-01) -
Towards lightweight model using non-local-based graph convolution neural network for SQL injection detection
by: Duc-Chinh Nguyen, et al.
Published: (2025-06-01)