|
|
|
Edwin Peralta-Garcia, Juan Quevedo-Monsalbe, Victor Tuesta-Monteza and Juan Arcila-Diaz
Structured Query Language (SQL) injections pose a constant threat to web services, highlighting the need for efficient detection to address this vulnerability. This study compares machine learning algorithms for detecting SQL injections in web microservi...
ver más
|
|
|
|
|
|
|
Yuting Guan, Junjiang He, Tao Li, Hui Zhao and Baoqiang Ma
SQL injection is a highly detrimental web attack technique that can result in significant data leakage and compromise system integrity. To counteract the harm caused by such attacks, researchers have devoted much attention to the examination of SQL injec...
ver más
|
|
|
|
|
|
|
Hao Sun, Yuejin Du and Qi Li
Amid the incessant evolution of the Internet, an array of cybersecurity threats has surged at an unprecedented rate. A notable antagonist within this plethora of attacks is the SQL injection assault, a prevalent form of Internet attack that poses a signi...
ver más
|
|
|
|
|
|
|
Fahad M. Alotaibi and Vassilios G. Vassilakis
Web attacks pose a significant threat to enterprises, as attackers often target web applications first. Various solutions have been proposed to mitigate and reduce the severity of these threats, such as web application firewalls (WAFs). On the other hand...
ver más
|
|
|
|
|
|
|
Jahanzeb Shahid, Muhammad Khurram Hameed, Ibrahim Tariq Javed, Kashif Naseer Qureshi, Moazam Ali and Noel Crespi
The growing use of the internet has resulted in an exponential rise in the use of web applications. Businesses, industries, financial and educational institutions, and the general populace depend on web applications. This mammoth rise in their usage has ...
ver más
|
|
|
|
|
|
|
?.?. Yudova,Olga R. Laponina
Pág. 61 - 68
This article is devoted to the analysis of the possibility of detecting attacks on web applications using machine learning algorithms. Supervised learning is considered. A sample of HTTP DATASET CSIC 2010 is used as a data set. The dataset was automatica...
ver más
|
|
|
|
|
|
|
Esteban Crespo-Martinez
Databases are usually the main targets of an attack, specifically for the information that they store, since, according to Druker, information is power. In this work vulnerability tests are performed of the database of an ERP software developed in APEX 5...
ver más
|
|
|
|
|
|
|
John Edison Moreno Marín, Paulo Cesar Coronado Sánchez
ResumenDescargasReferenciasCómo citar
|
|
|
|