Skip to main content

Table 3 Piggybacked query [54]

From: Detection and prevention of SQLI attacks and developing compressive framework using machine learning and hybrid techniques

Type of injection

Nature of attack

Recommended technique

Piggybacked query

Adding or altering data, performing DoS, and executing remote commands are all examples of data extraction

ML