Information-theoretic detection of SQL injection attacks

被引:0
|
作者
Shahriar, Hossain [1 ,2 ]
Zulkernine, Mohammad [1 ]
机构
[1] School of Computing, Queen's University, Kingston, ON, Canada
[2] Department of Computer Science, Kennesaw State University, Kennesaw, GA 30144, United States
关键词
D O I
October 25, 2012 - October 27, 2012
中图分类号
学科分类号
摘要
Entropy
引用
收藏
页码:40 / 47
相关论文
共 50 条
  • [1] Sparse Data Injection Attacks on Smart Grid: An Information-Theoretic Approach
    Sun, Ke
    Li, Zhenglin
    IEEE SENSORS JOURNAL, 2022, 22 (14) : 14553 - 14562
  • [2] Information-Theoretic Attacks in the Smart Grid
    Sun, Ke
    Esnaola, Inaki
    Perlaza, Samir M.
    Poor, H. Vincent
    2017 IEEE INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM), 2017, : 455 - 460
  • [3] Detection and prevention of SQL injection attacks
    Halfond, William G. J.
    Orso, Alessandro
    MALWARE DETECTION, 2007, : 85 - +
  • [4] Information-theoretic measures for anomaly detection
    Lee, W
    Xiang, D
    2001 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2001, : 130 - 143
  • [5] Information-Theoretic Signal Detection Theory
    Feldman, Jacob
    PSYCHOLOGICAL REVIEW, 2021, 128 (05) : 976 - 987
  • [6] On Localization Attacks to Internet Threat Monitors: An Information-Theoretic Framework
    Yu, Wei
    Zhang, Nan
    Fu, Xinwen
    Bettati, Riccardo
    Zhao, Wei
    2008 IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS & NETWORKS WITH FTCS & DCC, 2008, : 356 - +
  • [7] An Information-Theoretic View of Network-Aware Malware Attacks
    Chen, Zesheng
    Ji, Chuanyi
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2009, 4 (03) : 530 - 541
  • [8] Differential Power Analysis Attacks from an Information-Theoretic Perspective
    Grigorescu, Andrea
    Boche, Holger
    2019 IEEE INFORMATION THEORY WORKSHOP (ITW), 2019, : 45 - 49
  • [9] An Information-Theoretic Model for Adaptive Side-Channel Attacks
    Koepf, Boris
    Basin, David
    CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 286 - 296
  • [10] Correlation Approach for SQL Injection Attacks Detection
    Choras, Michal
    Kozik, Rafal
    Puchalski, Damian
    Holubowicz, Witold
    INTERNATIONAL JOINT CONFERENCE CISIS'12 - ICEUTE'12 - SOCO'12 SPECIAL SESSIONS, 2013, 189 : 177 - +