Skip to main content

Table 6 Common inference query attack [54]

From: Detection and prevention of SQLI attacks and developing compressive framework using machine learning and hybrid techniques

Types of attack

Nature of attack

Recommended technique

Blind SQLI [91]

Collect valuable data by inferring from the page's answers after asking the server a set of true/false questions

ML

Timing Attack[96]

Observe the response time, which will assist the attacker in making an informed decision about which injection approach to use

ML

Database Backdoor Attack

Set a trigger to collect the user's feedback and send it to his or her e-mail address

ML

Command SQLI

Injecting and executing system-level commands via a vulnerable program is the essence of the attack

Rule-based