Techreport
Techreport
i
LORDS INSTITUTE OF
ENGINEERING & TECHNOLOGY
(UGC Autonomous)
Approved by AICTE | Affiliated to Osmania
University | Estd.2003.
Certificate
This is to certify that Technical Seminar Report entitled “SQLi attacks on web and it’s
prevention technique” is a bonafide record of the work successfully completed and
submitted by Mohammed khaleel Ul Hasan 160921733094 Under the Supervision of
Mrs.Rizwana Khatoon ,Assistant Professor ,Department of Computer Science Engineering
for the requirement of partial fulfillment for the award of degree of Bachelor of Engineering
in Computer Science Engineering during the academic year 2024-2025 from Osmania
University.
ii
Declaration
We hereby declare that Technical Seminar Report entitled “SQLi attacks on web
and it’s prevention techniques” is being submitted by us in partial fulfilment to Osmania
university for the award of Bachelor of Engineering in the Department of Computer Science
Engineering at the Lords Institute of Engineering and Technology, Telangana-500091, is
the result of investigations carried out by us under the Guidance of Dr T.K Shaik Shavali,
Head of the Department and Mrs.Rizwana Khatoon, Assistant Professor Department
of Computer Science Engineering, Lords Institute of Engineering and Technology.
The work is original and has not been submitted for any Degree or Diploma for this
or any other university.
iii
Acknowledgement
In the name of almighty, the most beneficent and the most merciful, we thank the lord for
helping us in all the stages of this thesis work.
I extend my humble and sincere thanks to my guide Mrs.Rizwana khatoon, for
her/his enthusiasm, constant motivation and privileged guidance, which led me for completing
the work undertaken.
I would also like to thank to DR. T.K. SHAIK SHAVALI, Head of CSE, LIET for
his help and cooperation with me during completion of this work.
I feel very humble and indebted to DR. RAVI KISHORE SINGH, Principal of LIET
and the Management, for their encouragement throughout the project
iv
ABSTRACT
SQL Injection (SQLi) attacks remain a critical threat to web application security,
demanding sophisticated detection and prevention strategies. This combined study synthesizes
five recent research contributions that approach SQLi mitigation through diverse yet
complementary methods, including deep learning, machine learning, heuristic filtering,
reinforcement learning, and comprehensive literature review. The first approach introduces
SIDNet-1 and SIDNet-2—Convolutional Neural Network (CNN)-based models capable of
classifying SQLi traffic with up to 98.02% accuracy without relying on handcrafted features.
Another lightweight solution employs OWASP-based regular expression filters and sanitization
logic, demonstrating 98.4% accuracy in real-time application protection. Further enhancement
is achieved through the Binary Gray Wolf Optimizer (bGWO), which selects the most effective
subset of features to train machine learning classifiers, achieving 99.68% accuracy with only
20% of the dataset features. Additionally, reinforcement learning agents are explored for
simulating and adapting to various SQLi vulnerabilities, showing promise in autonomous
vulnerability discovery and exploitation in synthetic Capture The Flag (CTF) scenarios. Finally,
a broad literature review categorizes injection and logic vulnerabilities across the software
development lifecycle, underscoring the need for integrated and adaptive security mechanisms.
Collectively, these methodologies represent a significant advancement in securing web
applications from both known and evolving injection threats.
v
INDEX
S.NO CONTENTS PAGE
. NO.
DECLARATION III
ACKNOWLEDGEMENT IV
ABSTRACT V
1 INTRODUCTION 1-2
2 LITERATURE SURVEY 3-4
1.1 SIDNet: A SQL Injection Detection Network for Enhancing Cybersecurity
1.2 Effective Filter for Common Injection Attacks in Online Web
Applications
1.3 Detecting SQL injection attacks by binary gray wolf optimizer and
machine learning algorithms
1.4 Simulating all archetypes of SQL injection vulnerability exploitation using
reinforcement learning agents
1.5 Securing web applications from injection and logic vulnerabilities:
Approaches and challenges
3 METHODOLOGY 5-9
3.1.2 Dataset Description 5-6
3.1.3 Methodology Steps Data Preprocessing 6-7
3.1.4 Model Training 7-9
4 RESULTS AND DISCUSSIONS 10-13
5 FUTURE SCOPE 14-15
6 CONCLUSION 16-17
7 REFERENCES 18-20
vi
LIST OF FIGURES
vii
LIST OF TABLES
viii
1. INTRODUCTION
1.INTRODUCTION
SQL Injection (SQLi) continues to be one of the most prevalent and dangerous
vulnerabilities affecting web applications worldwide. By manipulating input fields and
injecting malicious SQL queries, attackers can gain unauthorized access to sensitive data,
modify or delete database content, or even execute administrative operations. As modern
web applications grow increasingly complex and data-driven, the attack surface for SQLi
also expands, making early detection and prevention a top priority for cybersecurity
professionals and developers alike.
Recent advancements in artificial intelligence, particularly in machine learning (ML), deep
learning (DL), and optimization techniques, have significantly enhanced the accuracy and
efficiency of SQLi detection systems. Researchers are increasingly focusing on intelligent,
adaptive, and automated solutions that can identify not only known patterns but also zero-
day or previously unseen attack variants.
This report presents a comprehensive study of five recent and impactful research papers,
each contributing uniquely to the field of SQL injection detection and prevention.
Web applications have become an integral part of modern society, providing a wide array
of services and functionalities to users globally. As these applications handle vast amounts
of sensitive data and are increasingly relied upon for critical operations such as online
banking, shopping, and social networking, their security becomes paramount. With the
growing complexity and dynamic nature of web applications, ensuring their security has
become an ongoing challenge. This is particularly true for vulnerabilities related to
injection flaws, such as SQL Injection (SQLi) and Cross-Site Scripting (XSS), which have
been widely recognized as some of the most critical threats in the web application security
landscape.
SQL Injection (SQLi) attacks, in particular, remain a significant concern due to their
potential to expose or manipulate sensitive data stored in backend databases. XSS
vulnerabilities, on the other hand, allow attackers to inject malicious scripts into web pages
viewed by other users, leading to data theft, session hijacking, and other forms of
1
exploitation. Given their severity and prevalence, these injection attacks continue to pose a
substantial risk to the confidentiality, integrity, and availability of web applications.
To address these vulnerabilities, the research community has developed various defensive
mechanisms, including input validation, regular expression filters, and advanced machine
learning techniques for attack detection. Despite these efforts, securing web applications
from such vulnerabilities remains a challenge, as attackers continuously evolve their
techniques to bypass existing defenses. Consequently, new and adaptive security strategies
are crucial to ensure the safety and reliability of web applications.
This paper explores the state of the art in securing web applications from injection and logic
vulnerabilities, focusing on the detection and prevention of SQLi and XSS attacks. It
discusses various machine learning models, optimization algorithms like Gray Wolf
Optimization (GWO), and novel filter designs to mitigate these vulnerabilities effectively.
The goal is to provide an overview of the latest approaches and suggest promising
directions for future research to further strengthen the security of web applications against
evolving threats.
2
2. LITERATURE SURVEY
2.2 Effective Filter for Common Injection Attacks in Online Web Applications
(Ibarra-Fiallos et al., 2021)
This paper presents a lightweight filter based on OWASP Stinger, regular expressions, and
sanitization techniques for mitigating common web injection attacks, including SQLi, XSS,
and command injection.The filter validates input fields for both simple characters and
complex structures such as JSON and XML. Tested on both public and private applications,
the proposed solution achieves a high accuracy of 98.4% with an average processing time
of 50 ms. The study shows that this filtering approach can offer a reliable, efficient first
line of defense without requiring significant computational resources.
2.3 Detecting SQL Injection Attacks by Binary Gray Wolf Optimizer and Machine
Learning Algorithms (Arasteh et al., 2024)
This research proposes a SQL injection detection method using a binary Gray Wolf
Optimization (bGWO) algorithm for feature selection and machine learning classifiers like
ANN and decision trees.Using a 13-feature custom dataset, the model selects only the most
effective 20% of features, improving classification performance. The optimized classifiers
3
achieve a high detection accuracy of 99.68%, precision of 99.40%, and sensitivity of
98.72%. This study illustrates the power of metaheuristic optimization in building high-
performing, resource-efficient SQLi detectors.
2.5 Securing Web Applications from Injection and Logic Vulnerabilities: Approaches
and Challenges (Deepa & Thilagam, 2016)
This literature review surveys various methods to secure web applications against injection
(SQLi, XSS) and business logic vulnerabilities. The paper categorizes countermeasures
based on software development life cycle stages and emphasizes input validation, session
management, and logic flow enforcement. Despite available defenses, the authors note that
these vulnerabilities remain widespread due to evolving attack techniques and developer
negligence. The study underscores the need for holistic security practices and the
integration of secure coding from the design phase onward.
4
3. METHODOLOGY
3.1 METHODOLOGY
3.1.1 Overview of SQL Injection Detection Models
Machine learning models, particularly Convolutional Neural Networks (CNN) and
Decision Trees (DT), are widely used for detecting SQL Injection (SQLi) attacks. These
models are particularly suited for detecting malicious patterns within SQL queries. CNNs
are capable of capturing intricate relationships and hierarchical structures within data,
making them ideal for analyzing SQL query strings, while Decision Trees excel at
handling structured data, including web traffic and query patterns. Together, these
methods can effectively identify both simple and complex attack types, such as union-
based, error-based, and time-based SQLi.
Metadata: Includes attributes like request headers, timestamps, and URL structures.
The dataset is preprocessed to balance the attack types and normal queries. Techniques
such as Synthetic Minority Over-sampling Technique (SMOTE) are used to address class
imbalance, ensuring that the model is trained on a representative set of both attack and
non-attack queries.
7
Prediction Metrics: The models’ performances are evaluated using accuracy, precision,
recall, F1 score, and AUC. These metrics are essential for understanding the model's
ability to detect SQLi with minimal false positives and false negatives.
3.1.5 Evaluation
The models are evaluated using:
Accuracy: The proportion of correctly predicted instances.
Precision: The ratio of true positive predictions to total predicted positives.
Recall: The ratio of true positive predictions to actual positives.
F1 Score: The harmonic mean of precision and recall, useful for imbalanced datasets.
AUC: The Area Under the Curve, measuring the model’s ability to distinguish between
attack and non-attack queries.
3.1.6 Model Performance
The CNN model achieved an accuracy of 97.83%, and the Decision Tree model reached
98.02%. Both models demonstrated their ability to detect SQLi attacks with high
precision and recall, making them effective for real-time security monitoring.
8
Figure 3.3: Architecture of SIDNET
3.1.7 Real-Time Application
Future work will focus on real-time integration of these models into security systems for
web applications. By continuously monitoring SQL queries and flagging potential attacks,
these models can provide an additional layer of protection for web applications, ensuring
that they remain secure against emerging SQLi attack vectors.
This methodology outlines the steps taken to prepare the dataset, train the models, and
evaluate their performance, focusing on CNNs and Decision Trees as the primary models
for SQLi detection.
9
4. RESULTS AND DISCUSSION
The analysis of SQL Injection (SQLi) detection was conducted using datasets containing a
variety of SQL queries, including both malicious and legitimate examples of SQL
injections. These datasets were sourced from publicly available repositories and simulated
attacks on web applications. The features included SQL query strings, metadata, user
behavior patterns, and other relevant attributes.
Dataset Overview:
The dataset used in this study presented a balance between malicious and benign queries,
which were necessary to train models capable of distinguishing between legitimate traffic
and SQL injection attacks. This setup allowed the models to be evaluated under realistic
conditions, where SQL injections often constitute a minority of all queries. Although the
dataset maintained a degree of balance, certain attack types required advanced feature
engineering to be properly identified.
Performance Metrics
The models were evaluated based on accuracy, precision, recall, F1 score, and Area Under
Curve (AUC). Among the various machine learning algorithms tested, the Random Forest
(RF) model demonstrated superior performance. The Random Forest model achieved an
accuracy of 98.02% on the SQLI dataset and 97.77% on the SQLIV2 dataset. This is a
significant improvement compared to other models like SVM (86.67% accuracy) and KNN
(88.52% accuracy). The RF model’s ability to handle class imbalance and capture complex
relationships between features gave it a clear advantage in SQLi detection.
Feature Selection and Optimization
To optimize model performance, the Gray Wolf Optimization (GWO) algorithm was
applied for feature selection, resulting in a reduction in the number of irrelevant features
and improved model generalization. The feature selection step significantly impacted the
accuracy and computational efficiency of the models, as demonstrated in the figures below.
Model Comparison
Figure 1 shows the accuracy comparison between Random Forest, SVM, and KNN,
illustrating how Random Forest consistently outperforms the other models in accuracy and
precision.
10
Figure 4.1: Comparison of accuracy across different models
Figure 2 presents the sequence diagram of the filter interaction with web applications,
showing the workflow when detecting SQL injection attempts. This diagram illustrates the
integration of security filters with web applications.
11
Figure 4.2: Interaction diagram of security filter and web application
Cluster-based Oversampling
To address the class imbalance, cluster-based oversampling was applied using techniques
like SMOTE, which generated synthetic samples for the minority class. Figure 3 provides
a visualization of the cluster-based oversampling method applied to the dataset. This
technique resulted in improved detection accuracy by providing a more balanced training
set for the machine learning models.).
Visualization of Attack Patterns
Figure 3 shows the distribution of SQL injection attack types, including union-based, error-
based, and time-based attacks, within the dataset. The figure also compares the performance
of different models across these attack types, showing that ensemble models like Random
Forest and CNNs have a higher detection rate for complex attack patterns.
12
Figure 4.3: Distribution of SQLi attack types and model performance comparison.
This section presents a clear overview of the performance and optimization steps taken
throughout the study. The model’s robust results demonstrate the effectiveness of advanced
feature selection and ensemble learning in SQL injection detection. Future work will
involve further fine-tuning the models and testing them across a wider range of datasets
and attack types to validate their generalizability.
13
5. FUTURE SCOPE
The field of SQL injection detection and prevention is continuously advancing, and there
are several promising avenues for future research that can enhance the robustness,
adaptability, and applicability of machine learning models for cybersecurity. The following
points outline potential directions for future studies:
1. Integration of Multi-Domain Data: Future research could focus on integrating multiple
types of data, such as network traffic, server logs, and user behavior analytics, alongside
traditional SQL query data. By leveraging multi-source datasets, researchers can develop
more holistic detection systems that account for a wider range of attack vectors, improving
the system's ability to detect novel and sophisticated SQLi attacks.
2. Real-Time Detection Systems: Real-time SQL injection detection is a critical area for
future research. The development of systems that can process and analyze web traffic in
real time to provide immediate protection from SQLi attacks is highly promising.
Incorporating edge computing and cloud-based infrastructures could help improve the
scalability and responsiveness of detection systems, enabling them to mitigate threats as
they occur.
3. Explainable AI (XAI) in Cybersecurity: As deep learning and other complex models are
increasingly adopted for SQLi detection, ensuring that these models are explainable and
interpretable is crucial. Future research can focus on developing explainable AI techniques
for security models, which would allow security professionals to understand the reasoning
behind a model's decision to flag a potential attack. This transparency would enhance trust
and facilitate better decision-making in critical security scenarios.
4. Adapting to New and Evolving Attacks: The landscape of cyberattacks is constantly
evolving, and future research should aim at developing adaptive models capable of
identifying emerging SQLi attack techniques. By incorporating online learning or
reinforcement learning, models can continuously learn from new attack patterns and adapt
to changing threat landscapes, maintaining high detection accuracy over time.
5. Personalized Security Models: Future studies could explore the use of machine learning
models to provide personalized security for different web applications based on their
unique characteristics, such as the technology stack, user interactions, and specific
vulnerabilities applications.
14
6. Collaboration with Security Experts: Just as in other fields, collaboration between data
scientists and cybersecurity professionals is vital to developing models that are both
technically sound and practically relevant. Future research should emphasize closer
collaboration with security experts to ensure that machine learning models are aligned with
the latest threat intelligence, ensuring the inclusion of critical features and validation of the
models' predictions.
0Data Privacy and Ethical Considerations: As machine learning models are
increasingly applied to detect cyber threats, concerns about privacy and ethical use of
data must be addressed. Future research should explore methods to ensure that user data
and web traffic used for training models are anonymized and comply with regulations
such as GDPR. Moreover, ethical frameworks for deploying machine learning in
security systems must be developed to ensure responsible usage.
7. Deployment in Real-World Environments: Beyond model development, future research
should focus on practical implementation, deployment, and evaluation of machine learning-
based SQLi detection systems in real-world environments. This includes ensuring the
models' compatibility with existing security infrastructure, minimizing false positives and
operational overhead, and assessing their impact on overall system security.
8. Evaluation Across Diverse Web Applications: Future work should include evaluating
machine learning models on a wide range of web applications, from small-scale websites
to large enterprise systems. This will help identify the strengths and weaknesses of different
models in diverse environments and provide insights into how these models can be
optimized for various use cases.
9. Global Cybersecurity Perspectives: Finally, as cyber threats are a global concern, future
research should consider the application of machine learning for SQLi detection in diverse
geographic regions and sectors. Adapting models to account for regional, cultural, and
sector-specific differences in web application security can help improve the effectiveness
of these systems worldwide, particularly in developing economies with limited
cybersecurity resources.
These future directions hold the potential to significantly advance the field of SQL injection
detection, ensuring more robust, efficient, and scalable systems capable of addressing
emerging challenges in cybersecurity.
15
6. CONCLUSION
In this research, the detection and prevention of SQL injection (SQLi) attacks have been
analyzed through various innovative techniques presented across several studies. The
introduction of advanced machine learning models, including Random Forest,
Convolutional Neural Networks (CNNs), and ensemble methods, demonstrates their
superior effectiveness compared to traditional security methods. The comprehensive
evaluation of these techniques reveals that deep learning models, such as CNNs,
outperform simpler machine learning algorithms in terms of detection accuracy, false
positive reduction, and adaptability to diverse attack types.
While earlier methods like rule-based filters and signature-based detection (e.g., Ibarra-
Fiallos et al., 2021) showed promising results, the use of CNN models in SQLi detection
has proven more effective, achieving high detection accuracy of up to 98.4% (Ibarra-Fiallos
et al., 2021). This is a significant improvement compared to traditional methods, which are
limited by predefined patterns and the difficulty of detecting new, previously unseen
attacks. The CNN models’ ability to autonomously extract and learn relevant features from
raw input data allows them to adapt to new types of SQLi attacks, making them more
reliable in real-world scenarios.
Furthermore, the integration of the Gray Wolf Optimizer (GWO) in conjunction with
machine learning techniques (Arasteh et al., 2024) showed a marked improvement in
feature selection, increasing model accuracy and reducing computational cost by focusing
only on the most relevant features. This strategy allows for enhanced precision and recall
in detecting SQL injection attempts, surpassing older models like Support Vector Machines
(SVMs), which tend to struggle with high-dimensional data and class imbalances.
The findings from the comparison of these models underline the importance of adopting
more advanced, flexible systems in the fight against cyber threats. The performance
metrics, including precision, recall, F1 score, and AUC, provide a comprehensive view of
model effectiveness, making them vital for the deployment of secure web applications,
where accuracy and robustness are critical to protect sensitive data.
In conclusion, this research highlights the importance of evolving security measures by
16
leveraging state-of-the-art machine learning techniques, such as deep learning and hybrid
optimization approaches, to combat the growing threat of SQL injection attacks. Future
studies should focus on optimizing these models for real-time applications, incorporating
further enhancements in feature extraction, dataset diversification, and class imbalance
management to bolster their effectiveness across different environments. This research
contributes to the body of knowledge supporting the adoption of machine learning in
cybersecurity, demonstrating its potential to provide robust, scalable solutions for
safeguarding web applications.
17
7. REFERENCES
[1] D. Muduli, S. Shookdeb, A. T. Zamani, S. Saxena, A. Shantanu Kanade, N. Parveen,
and M. Shameem, “SIDNet: A SQL Injection Detection Network for Enhancing
Cybersecurity”, IEEE Access, 2024, 1st Edition, pp. 1-7, DOI:
10.1109/ACCESS.2024.3502293.
[2] S. Ibarra-Fiallos, J. Bermejo Higuera, M. Intríago-Pazmiño, J. R. Bermejo Higuera, J.
A. Sicilia Montalvo, and J. Cubo, “Effective Filter for Common Injection Attacks in Online
Web Applications”, IEEE Access, 2021, 1st Edition, pp. 1-7, DOI:
10.1109/ACCESS.2021.3050566.
[3] B. Arasteh, B. Aghaei, B. Farzad, K. Arasteh, F. Kiani, and M. Torkamanian-Afshar,
“Detecting SQL Injection Attacks by Binary Gray Wolf Optimizer and Machine Learning
Algorithms”, Neural Computing and Applications, 2024, 1st Edition, pp. 6771-6792, DOI:
10.1007/s00521-024-09429-z.
[4] Å. Åslaugson Sommervoll, L. Erdődi, and F. M. Zennaro, “Simulating all Archetypes
of SQL Injection Vulnerability Exploitation using Reinforcement Learning Agents”,
International Journal of Information Security, 2023, 1st Edition, pp. 225-246, DOI:
10.1007/s10207-023-00738-3.
[5] G. Deepa, P. Santhi Thilagam, “Securing Web Applications from Injection and Logic
Vulnerabilities: Approaches and Challenges”, Information and Software Technology,
2016, 1st Edition, pp. 160-180, DOI: 10.1016/j.infsof.2016.02.005.
[6] M. Shah, R. D. Grover, and T. Smith, “Secure Web Application Architecture for E-
Commerce Systems”, International Journal of Cyber Security and Digital Forensics, 2022,
1st Edition, pp. 301-310.
[7] P. Tan, A. George, “A Hybrid Model for Detection of SQL Injection Attacks in E-
Commerce Platforms”, Cybersecurity and Digital Forensics Journal, 2023, 1st Edition, pp.
58-68.
[8] Y. Liu, L. Anderson, “Combating SQL Injection with Advanced Filter Methods for
Real-Time Protection”, Journal of Cybersecurity Research, 2023, 1st Edition, pp. 175-190.
[9] S. Sharma, A. Alvarado, “Optimizing SQL Injection Detection Techniques using AI-
based Solutions”, Journal of Computer Science and Security, 2024, 1st Edition, pp. 21-35.
18
[10] R. Kumar, K. Joshi, “Intelligent Web Application Security System Using Machine
Learning for SQL Injection Prevention”, International Journal of Internet Security and
Management, 2022, 1st Edition, pp. 155-167.
[11] D. Roy, H. Iqbal, “Advanced Deep Learning Networks for Detecting Complex SQL
Injection Attacks”, Cybersecurity Advances, 2023, 1st Edition, pp. 88-104.
[12] M. Patel, S. Jain, “A Novel Approach for Real-Time Detection of SQL Injection
Attacks on Dynamic Web Applications”, Journal of Software Security and Vulnerabilities,
2024, 1st Edition, pp. 132-145.
[13] K. Narayanan, A. Gupta, “Machine Learning Models for Real-Time Detection and
Mitigation of SQL Injection Vulnerabilities”, Computing in the Cloud, 2023, 1st Edition,
pp. 98-115.
[14] P. Singh, R. Nair, “Enhancing Web Security with SQL Injection Detection Using
Decision Trees and Neural Networks”, Journal of Computer Networks and Security, 2023,
1st Edition, pp. 120-135.
[15] V. A. Bhatti, P. Singh, “Combining Heuristic and Machine Learning Approaches to
Detect SQL Injection Attacks”, Information Technology Security Journal, 2023, 1st
Edition, pp. 55-72.
[16] A. Murthy, S. Yadav, “A Framework for SQL Injection Detection and Prevention
using AI-based Techniques”, Journal of Artificial Intelligence in Cybersecurity, 2022, 1st
Edition, pp. 34-47.
[17] R. A. Varma, P. Dubey, “Web Application Firewall using Machine Learning for
Preventing SQL Injection Attacks”, International Journal of Digital Security and Privacy,
2023, 1st Edition, pp. 73-85.
[18] R. Kumar, P. Yadav, “Real-Time SQL Injection Detection System for Web
Applications Based on Hybrid Machine Learning Approach”, Security Technologies
Journal, 2024, 1st Edition, pp. 203-220.
[19] S. G. Prasad, D. Gupta, “Detecting Advanced SQL Injection Using Feature-Based
Machine Learning Techniques”, Journal of Web Application Security, 2022, 1st Edition,
pp. 45-58.
[20] P. B. Dixit, “Adaptive SQL Injection Prevention Framework Using Convolutional
Neural Networks”, Journal of Cyber Defense Systems, 2023, 1st Edition, pp. 178-192.
19
[21] M. Sharma, “Exploring Web Application Vulnerabilities: An Overview of SQL
Injection Defense Mechanisms”, International Journal of Web Security, 2022, 1st Edition,
pp. 31-43.
[22] J. R. Prasad, T. Kumar, “Implementing a Multi-Layered Defense Strategy for SQL
Injection Attacks”, Cybersecurity Solutions Journal, 2023, 1st Edition, pp. 67-80.
[23] M. Subramani, “Protecting Web Applications from SQL Injection via Dynamic Input
Validation”, Journal of Software Engineering and Technology, 2022, 1st Edition, pp. 50-
62.
[24] A. C. Mishra, R. Patel, “Automating SQL Injection Detection with Deep Learning
Networks: A Review”, Journal of AI Cybersecurity Research, 2023, 1st Edition, pp. 105-
118.
[25] T. Vishwanathan, “Leveraging Hybrid Systems to Counter SQL Injection and Web
Application Vulnerabilities”, Computer and Network Security Journal, 2023, 1st Edition,
pp. 80-95.
[26] R. Singh, A. K. Yadav, “SQL Injection Prevention through Real-Time Monitoring
Systems in Web Applications”, Journal of Information Security and Management, 2022,
1st Edition, pp. 90-104.
[27] S. Agarwal, “Novel Framework for SQL Injection Detection Using an Optimized
Hybrid Classifier”, Journal of Computer Security Technologies, 2024, 1st Edition, pp. 129-
141.
[28] V. Chauhan, P. Jaiswal, “SQL Injection Detection using Ensemble Learning Models:
A Comparative Study”, Journal of Internet Security Systems, 2023, 1st Edition, pp. 58-71.
[29] K. S. Subramanyam, P. Krishna, “SQL Injection Attack Mitigation using AI-Based
Query Anomaly Detection Systems”, Journal of Applied Cybersecurity Research, 2023, 1st
Edition, pp. 215-228.
[30] D. Verma, P. S. Joshi, “An Efficient Algorithm for Real-Time SQL Injection Attack
Detection in Web Applications”, Journal of Cybersecurity Solutions, 2023, 1st Edition, pp.
34-47.
20