Network firewalls, IPS, and even some dedicated Web application firewall technologies attempt to identify SQL injection via traditional signature-based protections. Signature protections attempt to identify and block SQL injection-related text patterns within Web traffic flows. Unfortunately, real world experience has proven that reliance upon signatures alone is not enough to defeat SQL Inject...