Skip to main content

Table 1 Common tautology attacks [54]

From: Detection and prevention of SQLI attacks and developing compressive framework using machine learning and hybrid techniques

Type of injection

Nature of attack

Approach for detection

String SQLI

Bypassing authentication, identifying injectable parameters using string data type, extracting data

Rule-based

Numeric SQLI

Bypassing authentication, identifying injectable parameters using numeric data type extracting data

Rule-based

Comment attack

Bypassing authentication, identifying injectable parameters using the comment form, extracting data

Rule-based