SQL-Injection Vulnerability Analysis Using Machine Learning Technique

Abstract

Internet may be the supreme supply of data, data is situated in distinct data format and can be accessible everywhere you go, consumer will get connection together with web by way of request covering available as GUI screen, signifies Net is accessible through the use of browser in which consumer might feed his/her data pertaining to authentication in case required through request. Seeing that on view natural environment involving web connection and design development, distinct authentication mechanism, security password safety and an incredible number of protection treatments have been made to defend the approval via unauthorized entry but still crooks are aimed towards distinct ways to break the actual protection, it may be through hit and walk methods, through infecting computer system, through surging computer system, But within the actual suggest cardstock a fresh strategy have been offered to get SQL-Injection being exposed, in case offered in user’s suggestions, the item assessments dilemma personal, finger prints and mapping blend to help think any intruding activities throughout the process, This suggest strategy is simple to use, since it simply desires fingerprinting and mapping paradigm involving dilemma and all too easy to change, in case new personal is found, instead of positioning any overhead within the existing doing work process.

Authors and Affiliations

Gunjan Shukla

Keywords

Related Articles

Securing Digital images using Reversible Watermarking by Pixel Histogram Shifting

A new reversible watermarking Scheme is proposed .One first contribution is a histogram shifting modulation which adaptively takes care of the local specificities of the image content. By applying it to the image predict...

Energy-Aware Service and Route Discovery Scheme for AODV using Piggybacking in MANETs (AODV-EASARD)

Mobile ad-hoc network (MANET) is an infrastructure-less multihop network where each node communicates with other nodes directly or indirectly through intermediate nodes. Thus, all nodes in a MANET basically function as h...

Facial Expression Based Face Recognition Using Machine Learning with SVM Kernel: HMM and FDA

Face recognition is that the powerful task from the pictures that is done by a machine that is ready to determine the face of a human being. Automatic face recognition is that the still awfully acknowledged and hard to p...

Applications of Accelerometer as a Vibration Detector

In the present world scenario, the integration of various sensors to create a smart sensor is on the rise. This paper deals with the use of accelerometer as a vibration detector. The main focus of this is to reduce the c...

An assessment of Challenges That Impede the Effectiveness of Ethiopia Human Rights Commission Protection and Promotion of Human Rights

The National Human Right Commission is seen as a backbone for the promotion, protection and realization of human rights provision in a given country. The proper protection and promotion of human rights are not something...

Download PDF file
  • EP ID EP241041
  • DOI -
  • Views 101
  • Downloads 0

How To Cite

Gunjan Shukla (2015). SQL-Injection Vulnerability Analysis Using Machine Learning Technique. International journal of Emerging Trends in Science and Technology, 2(6), 2741-2746. https://europub.co.uk/articles/-A-241041