SURGICAL STRIKING SQL INJECTION ATTACKS USING LSTM

3Citations
Citations of this article
16Readers
Mendeley users who have this article in their library.

Abstract

When a software program or website employs SQL databases such as Oracle, SQL Server, or MySQL, a SQL injection attack is possible. Phishers utilize SQL injection attacks to infiltrate confidential corporate and personal information, increasing the risk of compromise. If a SQL injection exploit is successful, it can be used to read and alter database data (e.g., insert, update, or delete), perform database administration operations, retrieve the data of a database management system file, also issue commands to the operating system in some cases. In comparison to basic recurrent architectures, LSTM networks have been demonstrated to learn long-term dependencies more quickly and reduce gradient disappearance and explosion. Preventing SQL injection with the usage of LSTMs is the subject of the proposed research. The LSTM model has been suggested as a training method for tracing or filtering requests from an unauthentic user. The dataset trained is looking at records that include the sender and recipient information, as well as the success or failure of the transmission. If this transaction has repeatedly failed due to an on-going assault on the system, then this is a red flag. Then, this system will flag the transaction and block the user from accessing any of the system's resources. This model has been trained to increase security by creating a system that allows the user to authenticate a transaction.

Author supplied keywords

Cite

CITATION STYLE

APA

Joshi Padma, N., Ravishankar, N., Raju, M. B., & Ravi, N. C. (2022). SURGICAL STRIKING SQL INJECTION ATTACKS USING LSTM. Indian Journal of Computer Science and Engineering, 13(1), 208–220. https://doi.org/10.21817/indjcse/2022/v13i1/221301182

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free