Comparison study for NLP using machine learning techniques to detecting SQL injection vulnerabilities

Publish Year: 1402
نوع سند: مقاله ژورنالی
زبان: English
View: 88

This Paper With 8 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

JR_IJNAA-14-8_025

تاریخ نمایه سازی: 4 مهر 1402

Abstract:

Due to the vast number of electronic attacks that occur on a daily basis, protecting users' data is extremely important in this age of technology. Nowadays, cyber security is regarded as a top priority. Thus, the preservation of user privacy and data security is essential. The SQL vulnerability isn't a new form of website attack; it's been around for a long time. However, it is a new attack nowadays. ML algorithms were used to solve the problem of detecting SQL Injection attacks on websites. By training seven ML algorithms on a batch of data comprising SQL injection queries, including (Naive Bayes, Neural-Network, SVM, Random-Forest, KNN, and Logistic Regression) and choosing the best model that gives the highest accuracy. In comparison to previous studies, high-precision data were obtained, with the Naive-Bayes algorithm achieving ۰.۹۹ accuracies, ۰.۹۸ precision, ۱.۰۰ recall, and a ۰.۹۹ f۱-score. In this paper, experiences, work schedules, and outcomes are examined. Compared to other methods, this naive Bayes approach has proven to be quite accurate in identifying SQL injection threats.

Authors

Manar AL-Maliki

Computer Science Department, Informatics Institute for Postgraduate Studies, Iraq

Mahdi Jasim

University of Information Technology and Communications, Iraq

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • J. Abirami, R. Devakunchari and C. Valliyammai, A top web ...
  • A. Alam, M. Tahreen, M.M. Alam, S.A. Mohammad and S. ...
  • M. Al-Maliki and M. Jasim, Review of SQL injection attacks: ...
  • N. Gandhi, J. Patel, R. Sisodiya, N. Doshi and S. ...
  • J. Harefa, G. Prajena, A. Alexander, A. Muhamad, E.V.S. Dewa ...
  • M. Hill and D. Swinhoe, The ۱۵ biggest data breaches ...
  • ¨ O. Kasim, An ensemble classification-based approach to detect attack ...
  • R.A. Katole, Parameter values of SQL query, ۲۰۱۸ ۲nd Int. ...
  • S.A. Krishnan, A.N. Sabu, P.P. Sajan and A.L. Sreedeep, SQL ...
  • L. Ma, D. Zhao, Y. Gao and C. Zhao, Research ...
  • S. Mishra, SQL injection detection using machine learning, Master’s Projects, ...
  • M.T. Muslihi and D. Alghazzawi, Detecting SQL injection on web ...
  • K. Natarajan and S. Subramani, Generation of SQL-injection free secure ...
  • OWASP, Top ۱۰ web application security risks, https://owasp.org/www-project-top-ten/, ۲۰۲۱ ...
  • T. Pattewar, H. Patil, H. Patil, N. Patil, M. Taneja ...
  • V.B. Polinati, S.C. Nekkalapudi, N.S. Sanjana and R.V. Bhupathiraju, SQL ...
  • K. Ross, SQL injection detection using machine learning techniques and ...
  • P. Yaworski, Web hacking ۱۰۱ how to make money hacking ...
  • K. Zhang, A machine learning based approach to identify SQL ...
  • نمایش کامل مراجع