{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T21:29:54Z","timestamp":1743110994857,"version":"3.40.3"},"publisher-location":"Heidelberg","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319009681"},{"type":"electronic","value":"9783319009698"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-319-00969-8_74","type":"book-chapter","created":{"date-parts":[[2013,5,23]],"date-time":"2013-05-23T02:14:36Z","timestamp":1369275276000},"page":"753-762","source":"Crossref","is-referenced-by-count":2,"title":["Evaluation of Various Techniques for SQL Injection Attack Detection"],"prefix":"10.1007","author":[{"given":"Micha\u0142","family":"Chora\u015b","sequence":"first","affiliation":[]},{"given":"Rafa\u0142","family":"Kozik","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"74_CR1","unstructured":"CERT Polska Annual Report (2011), \n                      http:\/\/www.cert.pl\/PDF\/ReportCP2011.pdf"},{"key":"74_CR2","unstructured":"SOPHOS homepage, \n                      http:\/\/www.sophos.com"},{"key":"74_CR3","unstructured":"Cisco Annual Report (2011)"},{"key":"74_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1007\/978-3-642-24755-2_9","volume-title":"Towards a Service-Based Internet","author":"M. Chora\u015b","year":"2011","unstructured":"Chora\u015b, M., Kozik, R., Piotrowski, R., Brzostek, J., Ho\u0142ubowicz, W.: Network Events Correlation for Federated Networks Protection System. In: Abramowicz, W., Llorente, I.M., Surridge, M., Zisman, A., Vayssi\u00e8re, J. (eds.) ServiceWave 2011. LNCS, vol.\u00a06994, pp. 100\u2013111. Springer, Heidelberg (2011)"},{"issue":"1","key":"74_CR5","first-page":"16","volume":"2","author":"T.K. Rao","year":"2012","unstructured":"Rao, T.K., Kum, G.Y., Reddy, E.K., Sharma, M.: Major Issues of Web Applications: A Case Study of SQL Injection. Journal of Current Computer Science and Technology\u00a02(1), 16\u201320 (2012)","journal-title":"Journal of Current Computer Science and Technology"},{"key":"74_CR6","doi-asserted-by":"crossref","unstructured":"Halfond, W., Orso, A.: AMNESIA: Analysis and Monitoring for Neutralizing SQL-Injection Attacks. In: Proceedings of the 20th IEEEACM International Conference on Automated Software Engineering (2005)","DOI":"10.1145\/1101908.1101935"},{"key":"74_CR7","unstructured":"https:\/\/paulsparrows.wordpress.com\/2011-cyber-attacks-timeline-master-index\/"},{"key":"74_CR8","unstructured":"OWASP Top 10 2010, The Ten Most Critical Web Application Security Risks (2010)"},{"key":"74_CR9","unstructured":"Royal Navy Website Attacked by Romanian Hacker (2008), \n                      http:\/\/www.bbc.co.uk\/news\/technology-11711478"},{"key":"74_CR10","unstructured":"Mills, E.: DSL Reports Says Member Information Stolen (2011)"},{"key":"74_CR11","unstructured":"Keizer, G.: Huge Web Hack Attack Infects 500,000 pages (2008)"},{"key":"74_CR12","doi-asserted-by":"crossref","unstructured":"Tajpour, A., Jor Jor Zade Shooshtari, M.: Evaluation of SQL Injection Detection and Prevention Techniques. In: CICSyN 2010, Second International Conference on Computational Intelligence, Communication Systems and Networks (2010)","DOI":"10.1109\/CICSyN.2010.55"},{"key":"74_CR13","doi-asserted-by":"crossref","unstructured":"Amirtahmasebi, K., Jalalinia, S.R., Khadem, S.: A Survey of SQL Injection Defense Mechanisms. In: ICITST International Conference for Internet Technology and Secured Transactions (2009)","DOI":"10.1109\/ICITST.2009.5402604"},{"key":"74_CR14","doi-asserted-by":"crossref","unstructured":"Elia, I.A., Fonseca, J., Vieira, M.: Comparing SQL Injection Detection Tools Using Attack Injection: An Experimental Study. In: 2010 IEEE 21st International Symposium on Software Reliability Engineering (2010)","DOI":"10.1109\/ISSRE.2010.32"},{"key":"74_CR15","doi-asserted-by":"crossref","unstructured":"Needleman, S.B., Wunsch, C.D.: A General Method Applicable to the Search for Similarities in the Amino Acid Sequence of Two Proteins. Journal of Molecular Biology (1970)","DOI":"10.1016\/0022-2836(70)90057-4"},{"key":"74_CR16","unstructured":"Conrad, E.: Detecting Spam with Genetic Regular Expressions. SANS Institute InfoSec Reading Room (2007)"},{"key":"74_CR17","doi-asserted-by":"crossref","unstructured":"Kruegel, C., Toth, T., Kirda, E.: Service specific anomaly detection for network intrusion detection. In: Proc. of ACM Symposium on Applied Computing, pp. 201\u2013208 (2002)","DOI":"10.1145\/508791.508835"},{"key":"74_CR18","unstructured":"Frank, E., Witten, I.H.: Generating Accurate Rule Sets Without Global Optimization. In: Fifteenth International Conference on Machine Learning, pp. 144\u2013151 (1998)"},{"key":"74_CR19","unstructured":"PHP-IDS project homepage, \n                      https:\/\/phpids.org\/"},{"key":"74_CR20","unstructured":"John, G.H., Langley, P.: Estimating Continuous Distributions in Bayesian Classifiers. In: Eleventh Conference on Uncertainty in Artificial Intelligence, San Mateo, pp. 338\u2013345 (1995)"},{"key":"74_CR21","unstructured":"Weka REPTree reference manual, \n                      http:\/\/www.dbs.informatik.uni-muenchen.de\/zimek\/diplomathesis\/implementations\/EHNDs\/doc\/weka\/classifiers\/trees\/REPTree.html"},{"key":"74_CR22","unstructured":"Quinlan, R.: C4.5: Programs for Machine Learning. Morgan Kaufmann Publishers, San Mateo (1993)"},{"key":"74_CR23","unstructured":"RIDOR classifier, \n                      http:\/\/weka.sourceforge.net\/doc\/weka\/classifiers\/rules\/Ridor.html"},{"key":"74_CR24","unstructured":"Kaspersky Lab. Security report, \n                      http:\/\/www.securelist.com\/en\/analysis\/204792244\/The-geography-of-cybercrime-Western-Europe-and-North-America"},{"key":"74_CR25","unstructured":"ESET annual report, \n                      http:\/\/go.eset.com\/us\/resources\/white-papers\/Trends-for-2013-preview.pdf"},{"key":"74_CR26","unstructured":"ESET threat report (December 2012), \n                      http:\/\/go.eset.com\/us\/resources\/threat-trends\/Global-Threat-Trends-November-2012.pdf"},{"key":"74_CR27","series-title":"AISC","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/978-3-642-33018-6_18","volume-title":"International Joint Conference CISIS\u201912-ICEUTE\u00b412-SOCO\u00b412 Special Sessions","author":"M. Chora\u015b","year":"2013","unstructured":"Chora\u015b, M., Kozik, R., Puchalski, D., Ho\u0142ubowicz, W.: Correlation Approach for SQL Injection Attacks Detection. In: Herrero, \u00c1., Sn\u00e1\u0161el, V., Abraham, A., Zelinka, I., Baruque, B., Quinti\u00e1n, H., Calvo, J.L., Sedano, J., Corchado, E., et al. (eds.) Int. Joint Conf. CISIS\u201912-ICEUTE\u201912-SOCO\u201912. AISC, vol.\u00a0189, pp. 177\u2013185. Springer, Heidelberg (2013)"},{"key":"74_CR28","doi-asserted-by":"crossref","unstructured":"Chora\u015b, M., Kozik, R.: Real-Time Analysis of Non-stationary and Complex Network Related Data for Injection Attempts Detection. In: Proc. of WSC 17 Online Conference on Soft Computing in Industrial Applications (2012)","DOI":"10.1007\/978-3-319-00930-8_23"},{"key":"74_CR29","unstructured":"WEKA 3 Data mining tool homepage, \n                      http:\/\/www.cs.waikato.ac.nz\/ml\/weka\/"},{"key":"74_CR30","doi-asserted-by":"crossref","unstructured":"Ficco, M., Coppolino, L., Romano, L.: A Weight-Based Symptom Correlation Approach to SQL Injection Attacks. In: Fourth Latin-American Symposium on Dependable Computing, LADC 2009, September 1-4, pp. 9\u201316 (2009)","DOI":"10.1109\/LADC.2009.14"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 8th International Conference on Computer Recognition Systems CORES 2013"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-00969-8_74","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T12:55:49Z","timestamp":1676811349000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-00969-8_74"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783319009681","9783319009698"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-00969-8_74","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2013]]}}}