Detection and prevention of SQLI attacks and developing compressive framework using machine learning and hybrid techniques

نویسندگان

چکیده

Abstract A web application is a software system that provides an interface to its users through browser on any operating (OS). Despite their growing popularity, security threats have become more diverse, resulting in severe damage. Malware attacks, particularly SQLI are common poorly designed applications. This vulnerability has been known for than two decades and still source of concern. Accordingly, different techniques proposed counter attacks. However, the majority them either fail cover entire scope problem. The structured query language injection (SQLI) attack among most harmful online attacks often happens when attacker(s) alter (modify), remove (delete), read, copy data from database servers. All facets security, including confidentiality, integrity, availability, can be impacted by successful attack. paper investigates forms, mechanisms, method identifying, detecting, preventing based existence SQL query. Here, we developed comprehensive framework detecting effectiveness address specific issues following essence using traditional Navies Bayes (NB), Decision Trees (DT), Support Vectors Machine (SVM), Random Forests (RF), Logistic Regression (LR), Neural Networks Based Multilayer Perceptron (MLP), hybrid approach used our study. machine learning (ML) algorithms were implemented Keras library, while classical methods Tensor Flow-Learn package. For this research work, gathered 54,306 pieces weblogs, cookies, session usage, HTTP (S) request files train test model. performance evaluation results training set metrics such as (ANN SVM) perform better accuracies precision (99.05% 99.54%), recall (99.65% 99.61%), f1-score (99.35% 99.57%), (99.20% 99.60%) respectively other ML approaches. time too high (i.e., 19.62 26.16 s respectively) NB RF. technique performs accuracy, precision, recall, f1-score, metrics, best time. Additionally, (98.87% 99.20%), (99.13% 99.47%), (99.00% 99.33%) (98.70% 99.40%) 11.76 15.33 ms respectively). techniques, SVM ANN weak learners. achieved indicated detection prevention mechanism improved over previously theme. Finally, paper, aimed keep researchers up-to-date, with contributions, recommendations understanding intersection between artificial intelligence (AI) field.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

the relationship between using language learning strategies, learners’ optimism, educational status, duration of learning and demotivation

with the growth of more humanistic approaches towards teaching foreign languages, more emphasis has been put on learners’ feelings, emotions and individual differences. one of the issues in teaching and learning english as a foreign language is demotivation. the purpose of this study was to investigate the relationship between the components of language learning strategies, optimism, duration o...

15 صفحه اول

synthesis of amido alkylnaphthols using nano-magnetic particles and surfactants

we used dbsa and nano-magnetic for the synthesis of amido alkylnaphtols.

15 صفحه اول

investigating the effect of motivation and attitude towards learning english, learning style preferences and gender on iranian efl learners proficiency

تحقیق حاضر به منظور بررسی تاثیر انگیزه و نگرش نسبت به یادگیری زبان انگلیسی، ترجیحات سبک یادگیری و جنسیت بر بسندگی فراگیران ایرانی زبان انگلیسی انجام شد. برای این منظور، 154 فراگیر ایرانی زبان انگلیسی در این تحقیق شرکت کردند. سه ابزار جمع آوری داده ها شامل آزمون تعیین سطح بسندگی زبان انگلیسی آکسفورد، پرسشنامه ترجیحات سبک یادگیری براچ و پرسشنامه انگیزه و نگرش نسبت به یادگیری زبان انگلیسی به م...

language learning strategies and vocabulary size of iranian efl learners

learning a second or foreign language requires the manipulation of four main skills, namely, listening, reading, speaking, and writing which lead to effective communication. it is obvious that vocabulary is an indispensible part of any communication, so without a vocabulary, no meaningful communication can take place and meaningful communication relies heavily on vocabulary. one fundamental fac...

Detection of Probe Attacks Using Machine Learning Techniques

In recent years, the number of attacks on the computer networks and its components are getting increasing. To protect from these attacks various Intrusion detection techniques have been used. Intrusion Detection System (IDS) is a system which collects and analyzes the information from the network to identify various attacks made against the components of a network. In this paper we presented a ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Big Data

سال: 2022

ISSN: ['2196-1115']

DOI: https://doi.org/10.1186/s40537-022-00678-0