{"id":"https://openalex.org/W4320801458","doi":"https://doi.org/10.1109/icca56443.2022.10039611","title":"Diverse Approaches Have Been Presented To Mitigate SQL Injection Attack, But It Is Still Alive: A Review","display_name":"Diverse Approaches Have Been Presented To Mitigate SQL Injection Attack, But It Is Still Alive: A Review","publication_year":2022,"publication_date":"2022-12-20","ids":{"openalex":"https://openalex.org/W4320801458","doi":"https://doi.org/10.1109/icca56443.2022.10039611"},"language":"en","primary_location":{"id":"doi:10.1109/icca56443.2022.10039611","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icca56443.2022.10039611","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Conference on Computer and Applications (ICCA)","raw_type":"proceedings-article"},"type":"review","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047356664","display_name":"Mohammad Qbea\u2019h","orcid":"https://orcid.org/0000-0001-5621-4946"},"institutions":[{"id":"https://openalex.org/I201726411","display_name":"United Arab Emirates University","ror":"https://ror.org/01km6p862","country_code":"AE","type":"education","lineage":["https://openalex.org/I201726411"]}],"countries":["AE"],"is_corresponding":true,"raw_author_name":"Mohammad Qbea'h","raw_affiliation_strings":["College of IT, United Arab Emirates University,Department of Information System and Security,Al Ain,UAE","Department of Information System and Security, College of IT, United Arab Emirates University, Al Ain, UAE"],"affiliations":[{"raw_affiliation_string":"College of IT, United Arab Emirates University,Department of Information System and Security,Al Ain,UAE","institution_ids":["https://openalex.org/I201726411"]},{"raw_affiliation_string":"Department of Information System and Security, College of IT, United Arab Emirates University, Al Ain, UAE","institution_ids":["https://openalex.org/I201726411"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000085565","display_name":"Saed Alrabaee","orcid":"https://orcid.org/0000-0001-8842-493X"},"institutions":[{"id":"https://openalex.org/I201726411","display_name":"United Arab Emirates University","ror":"https://ror.org/01km6p862","country_code":"AE","type":"education","lineage":["https://openalex.org/I201726411"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Saed Alrabaee","raw_affiliation_strings":["College of IT, United Arab Emirates University,Department of Information System and Security,Al Ain,UAE","Department of Information System and Security, College of IT, United Arab Emirates University, Al Ain, UAE"],"affiliations":[{"raw_affiliation_string":"College of IT, United Arab Emirates University,Department of Information System and Security,Al Ain,UAE","institution_ids":["https://openalex.org/I201726411"]},{"raw_affiliation_string":"Department of Information System and Security, College of IT, United Arab Emirates University, Al Ain, UAE","institution_ids":["https://openalex.org/I201726411"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031170157","display_name":"Mohammad Alshraideh","orcid":"https://orcid.org/0000-0002-2724-9290"},"institutions":[{"id":"https://openalex.org/I114972647","display_name":"University of Jordan","ror":"https://ror.org/05k89ew48","country_code":"JO","type":"education","lineage":["https://openalex.org/I114972647"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Mohammad Alshraideh","raw_affiliation_strings":["The University of Jordan,Computer Science Department,Amman,Jordan","Computer Science Department, The University of Jordan, Amman, Jordan"],"affiliations":[{"raw_affiliation_string":"The University of Jordan,Computer Science Department,Amman,Jordan","institution_ids":["https://openalex.org/I114972647"]},{"raw_affiliation_string":"Computer Science Department, The University of Jordan, Amman, Jordan","institution_ids":["https://openalex.org/I114972647"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017957430","display_name":"Khair Eddin Sabri","orcid":"https://orcid.org/0000-0002-8865-920X"},"institutions":[{"id":"https://openalex.org/I114972647","display_name":"University of Jordan","ror":"https://ror.org/05k89ew48","country_code":"JO","type":"education","lineage":["https://openalex.org/I114972647"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Khair Eddin Sabri","raw_affiliation_strings":["The University of Jordan,Computer Science Department,Amman,Jordan","Computer Science Department, The University of Jordan, Amman, Jordan"],"affiliations":[{"raw_affiliation_string":"The University of Jordan,Computer Science Department,Amman,Jordan","institution_ids":["https://openalex.org/I114972647"]},{"raw_affiliation_string":"Computer Science Department, The University of Jordan, Amman, Jordan","institution_ids":["https://openalex.org/I114972647"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5047356664"],"corresponding_institution_ids":["https://openalex.org/I201726411"],"apc_list":null,"apc_paid":null,"fwci":0.3671,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.66163142,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9861999750137329,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9254999756813049,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/sql-injection","display_name":"SQL injection","score":0.9400334358215332},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8014442920684814},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6270046830177307},{"id":"https://openalex.org/keywords/sql","display_name":"SQL","score":0.5097619891166687},{"id":"https://openalex.org/keywords/cover","display_name":"Cover (algebra)","score":0.4515458941459656},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.439378023147583},{"id":"https://openalex.org/keywords/web-application","display_name":"Web application","score":0.4275192618370056},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2562454044818878},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.2255086898803711},{"id":"https://openalex.org/keywords/query-by-example","display_name":"Query by Example","score":0.18951329588890076},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.10314902663230896}],"concepts":[{"id":"https://openalex.org/C150451098","wikidata":"https://www.wikidata.org/wiki/Q506059","display_name":"SQL injection","level":5,"score":0.9400334358215332},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8014442920684814},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6270046830177307},{"id":"https://openalex.org/C510870499","wikidata":"https://www.wikidata.org/wiki/Q47607","display_name":"SQL","level":2,"score":0.5097619891166687},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.4515458941459656},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.439378023147583},{"id":"https://openalex.org/C118643609","wikidata":"https://www.wikidata.org/wiki/Q189210","display_name":"Web application","level":2,"score":0.4275192618370056},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2562454044818878},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.2255086898803711},{"id":"https://openalex.org/C194222762","wikidata":"https://www.wikidata.org/wiki/Q114486","display_name":"Query by Example","level":4,"score":0.18951329588890076},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.10314902663230896},{"id":"https://openalex.org/C97854310","wikidata":"https://www.wikidata.org/wiki/Q19541","display_name":"Search engine","level":2,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C164120249","wikidata":"https://www.wikidata.org/wiki/Q995982","display_name":"Web search query","level":3,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icca56443.2022.10039611","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icca56443.2022.10039611","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Conference on Computer and Applications (ICCA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.75}],"awards":[{"id":"https://openalex.org/G7226459531","display_name":null,"funder_award_id":"12R143","funder_id":"https://openalex.org/F4320323593","funder_display_name":"United Arab Emirates University"}],"funders":[{"id":"https://openalex.org/F4320323593","display_name":"United Arab Emirates University","ror":"https://ror.org/01km6p862"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W2534651220","https://openalex.org/W2963314580","https://openalex.org/W2981809210","https://openalex.org/W2999058564","https://openalex.org/W3013619299","https://openalex.org/W3027359701","https://openalex.org/W3030072920","https://openalex.org/W3035999996","https://openalex.org/W3069109132","https://openalex.org/W3104241163","https://openalex.org/W3108546805","https://openalex.org/W3127152433","https://openalex.org/W3139278248","https://openalex.org/W4239614366","https://openalex.org/W6792094178"],"related_works":["https://openalex.org/W3107810407","https://openalex.org/W2571113418","https://openalex.org/W2359391484","https://openalex.org/W4206678297","https://openalex.org/W3196457791","https://openalex.org/W2133089983","https://openalex.org/W3202423697","https://openalex.org/W4385682279","https://openalex.org/W4372049114","https://openalex.org/W2915735776"],"abstract_inverted_index":{"A":[0],"huge":[1],"amount":[2],"of":[3,18,35,48,69,97,116,132,151,191,210],"stored":[4],"and":[5,13,50,71,125,128,135,139,159,181,212,225],"transferred":[6],"data":[7],"is":[8,33,65],"expanding":[9],"rapidly.":[10],"Therefore,":[11,44],"managing":[12],"securing":[14],"the":[15,36,42,91,95,117,157,161,196,232],"big":[16],"volume":[17],"diverse":[19],"applications":[20],"should":[21],"have":[22,52],"a":[23,45,114,169,178],"high":[24],"priority.":[25],"However,":[26,85],"Structured":[27],"Query":[28],"Language":[29],"Injection":[30],"Attack":[31],"(SQLIA)":[32],"one":[34],"most":[37,133],"common":[38],"dangerous":[39,152],"threats":[40],"in":[41,94,107,144,165,204,231],"world.":[43],"large":[46],"number":[47],"approaches":[49,140],"models":[51,73,138],"been":[53],"presented":[54],"to":[55,176,184,187,202,206,228,235],"mitigate,":[56],"detect":[57],"or":[58,81,147],"prevent":[59],"SQL":[60,86,122,193],"injection":[61,87,123],"attack":[62,88,124],"but":[63],"it":[64],"still":[66,89,172],"alive.":[67],"Most":[68],"old":[70],"current":[72,136],"are":[74,142],"created":[75],"based":[76,102],"on":[77,103],"static,":[78],"dynamic,":[79],"hybrid":[80],"machine":[82],"learning":[83],"techniques.":[84,167],"represents":[90],"highest":[92],"risk":[93],"trend":[96],"web":[98],"application":[99],"security":[100],"risks":[101],"several":[104,130],"recent":[105,134],"studies":[106],"2021.":[108],"In":[109],"this":[110,149],"paper,":[111],"we":[112,155,171,198,213],"present":[113],"review":[115],"latest":[118],"research":[119,234],"dealing":[120],"with":[121],"its":[126],"types,":[127],"demonstrating":[129],"types":[131],"techniques,":[137],"which":[141],"used":[143],"mitigating,":[145],"detecting":[146],"preventing":[148],"type":[150],"attack.":[153],"Then,":[154],"explain":[156],"weaknesses":[158],"highlight":[160],"critical":[162],"points":[163],"missing":[164],"these":[166,217],"As":[168],"result,":[170],"need":[173],"more":[174],"efforts":[175],"make":[177],"real,":[179],"novel":[180],"comprehensive":[182],"solution":[183],"be":[185],"able":[186],"cover":[188],"all":[189],"kinds":[190],"malicious":[192],"commands.":[194],"At":[195],"end,":[197],"provide":[199],"significant":[200],"guidelines":[201],"follow":[203],"order":[205],"mitigate":[207],"such":[208],"kind":[209],"attack,":[211],"strongly":[214],"believe":[215],"that":[216],"tips":[218],"will":[219],"help":[220],"developers,":[221],"decision":[222],"makers,":[223],"researchers":[224],"even":[226],"governments":[227],"innovate":[229],"solutions":[230],"future":[233],"stop":[236],"SQLIA.":[237]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
