Information-theoretic detection of SQL injection attacks

被引:0
|
作者
Shahriar, Hossain [1 ,2 ]
Zulkernine, Mohammad [1 ]
机构
[1] School of Computing, Queen's University, Kingston, ON, Canada
[2] Department of Computer Science, Kennesaw State University, Kennesaw, GA 30144, United States
关键词
D O I
October 25, 2012 - October 27, 2012
中图分类号
学科分类号
摘要
Entropy
引用
收藏
页码:40 / 47
相关论文
共 50 条
  • [41] Detection of SQL Injection Attacks using Hidden Markov Model
    Kar, Debabrata
    Agarwal, Khushboo
    Sahoo, Ajit Kumar
    Panigrahi, Suvasini
    PROCEEDINGS OF 2ND IEEE INTERNATIONAL CONFERENCE ON ENGINEERING & TECHNOLOGY ICETECH-2016, 2016, : 1 - 6
  • [42] A systematic review of detection and prevention techniques of SQL injection attacks
    Nasereddin, Mohammed
    ALKhamaiseh, Ashaar
    Qasaimeh, Malik
    Al-Qassas, Raad
    INFORMATION SECURITY JOURNAL, 2023, 32 (04): : 252 - 265
  • [43] On Preventing SQL Injection Attacks
    Ahuja, Bharat Kumar
    Jana, Angshuman
    Swarnkar, Ankit
    Halder, Raju
    ADVANCED COMPUTING AND SYSTEMS FOR SECURITY, VOL 1, 2016, 395 : 49 - 64
  • [44] Information-Theoretic Ensemble Learning for DDoS Detection with Adaptive Boosting
    Bhuyan, Monowar H.
    Ma, Maode
    Kadobayashi, Youki
    Elmroth, Erik
    2019 IEEE 31ST INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI 2019), 2019, : 995 - 1002
  • [45] Information-theoretic and set-theoretic similarity
    Cazzanti, Luca
    Gupta, Maya R.
    2006 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1-6, PROCEEDINGS, 2006, : 1836 - +
  • [46] An Iterative Information-Theoretic Approach to the Detection of Structures in Complex Systems
    Villani, Marco
    Sani, Laura
    Pecori, Riccardo
    Amoretti, Michele
    Roli, Andrea
    Mordonini, Monica
    Serra, Roberto
    Cagnoni, Stefano
    COMPLEXITY, 2018,
  • [47] A taxonomy of SQL Injection Attacks
    Sadeghian, Amirmohammad
    Zamani, Mazdak
    Abdullah, Shahidan M.
    2013 INTERNATIONAL CONFERENCE ON INFORMATICS AND CREATIVE MULTIMEDIA (ICICM), 2013, : 269 - 273
  • [48] Wireless information-theoretic security
    Bloch, Matthieu
    Barros, Joao
    Rodrigues, Miguel R. D.
    McLaughlin, Steven W.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) : 2515 - 2534
  • [49] Information-theoretic limits of control
    Touchette, H
    Lloyd, S
    PHYSICAL REVIEW LETTERS, 2000, 84 (06) : 1156 - 1159
  • [50] AN INFORMATION-THEORETIC FRAMEWORK FOR ROBUSTNESS
    MORGENTHALER, S
    HURVICH, C
    ANNALS OF THE INSTITUTE OF STATISTICAL MATHEMATICS, 1991, 43 (01) : 131 - 146