Taxonomy of SQL Injection: ML Trends & Open Challenges

SQL injections are a significant and ever-present threat to web applications and database security. During these attacks, malicious SQL statements are injected into input fields of data-driven systems, leading to unauthorized access and data breaches. Consequently, a need is generated to understand...

Full description

Saved in:
Bibliographic Details
Main Authors: Abobakr Busaeed, Raed Abdullah, Wan Isni Sofiah, Wan Din, Waseem, Quadri, Azlee, Zabidi
Format: Conference or Workshop Item
Language:English
English
Published: IEEE 2023
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/38717/1/Taxonomy_of_SQL_Injection_ML_Trends_amp_Open_Challenges.pdf
http://umpir.ump.edu.my/id/eprint/38717/2/Taxonomy%20of%20SQL%20Injection.pdf
http://umpir.ump.edu.my/id/eprint/38717/
https://doi.org/10.1109/ICSECS58457.2023.10256276
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:SQL injections are a significant and ever-present threat to web applications and database security. During these attacks, malicious SQL statements are injected into input fields of data-driven systems, leading to unauthorized access and data breaches. Consequently, a need is generated to understand the nature of the attacks, detection, and effective prevention techniques. This research paper focuses on providing a taxonomy and comprehensive survey of SQL injection attacks, detection, and prevention, including their various types and techniques. Additionally, it explores the current state-of-the-art and evaluation for attacks, detection, and prevention techniques. This research paper also discusses and provides a taxonomy of current machine learning (ML) trends (Taxonomy) and their open challenges for detection purposes. Finally, this paper ends with a discussion aiming to equip system administrators, researchers, scientists and practitioners with the knowledge and strategies to mitigate the risks associated with SQL injection attacks effectively. Eventually, this will help to enhance the security and resilience of web applications and databases in the face of this significant threat.