{"id":"https://openalex.org/W4391094707","doi":"https://doi.org/10.1109/icecet58911.2023.10389469","title":"Artificial Intelligence-Based Model for Data Security and Mitigation Against SQL Injection Attacks in Web Applications","display_name":"Artificial Intelligence-Based Model for Data Security and Mitigation Against SQL Injection Attacks in Web Applications","publication_year":2023,"publication_date":"2023-11-16","ids":{"openalex":"https://openalex.org/W4391094707","doi":"https://doi.org/10.1109/icecet58911.2023.10389469"},"language":"en","primary_location":{"id":"doi:10.1109/icecet58911.2023.10389469","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icecet58911.2023.10389469","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Conference on Electrical, Computer and Energy Technologies (ICECET)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026774876","display_name":"Jide Ebenezer Taiwo Akinsola","orcid":"https://orcid.org/0000-0003-2505-4024"},"institutions":[{"id":"https://openalex.org/I4210161785","display_name":"First Technical University","ror":"https://ror.org/05tb13r23","country_code":"NG","type":"education","lineage":["https://openalex.org/I4210161785"]}],"countries":["NG"],"is_corresponding":true,"raw_author_name":"Jide E. T. Akinsola","raw_affiliation_strings":["First Technical University,Department of Computer Sciences,Ibadan,Nigeria","Department of Computer Sciences, First Technical University, Ibadan, Nigeria"],"affiliations":[{"raw_affiliation_string":"First Technical University,Department of Computer Sciences,Ibadan,Nigeria","institution_ids":["https://openalex.org/I4210161785"]},{"raw_affiliation_string":"Department of Computer Sciences, First Technical University, Ibadan, Nigeria","institution_ids":["https://openalex.org/I4210161785"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059089483","display_name":"John E. Efiong","orcid":"https://orcid.org/0000-0003-4391-2475"},"institutions":[{"id":"https://openalex.org/I45711476","display_name":"Obafemi Awolowo University","ror":"https://ror.org/04snhqa82","country_code":"NG","type":"education","lineage":["https://openalex.org/I45711476"]}],"countries":["NG"],"is_corresponding":false,"raw_author_name":"John E. Efiong","raw_affiliation_strings":["Obafemi Awolowo University,Department of Computer Science and Engineering,Ile - Ife,Nigeria","Department of Computer Science and Engineering, Obafemi Awolowo University, Ile - Ife, Nigeria"],"affiliations":[{"raw_affiliation_string":"Obafemi Awolowo University,Department of Computer Science and Engineering,Ile - Ife,Nigeria","institution_ids":["https://openalex.org/I45711476"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Obafemi Awolowo University, Ile - Ife, Nigeria","institution_ids":["https://openalex.org/I45711476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004522042","display_name":"Emmanuel Ajayi Olajubu","orcid":"https://orcid.org/0000-0002-3244-0807"},"institutions":[{"id":"https://openalex.org/I45711476","display_name":"Obafemi Awolowo University","ror":"https://ror.org/04snhqa82","country_code":"NG","type":"education","lineage":["https://openalex.org/I45711476"]}],"countries":["NG"],"is_corresponding":false,"raw_author_name":"Emmanuel A. Olajubu","raw_affiliation_strings":["Obafemi Awolowo University,Department of Computer Science and Engineering,Ile - Ife,Nigeria","Department of Computer Science and Engineering, Obafemi Awolowo University, Ile - Ife, Nigeria"],"affiliations":[{"raw_affiliation_string":"Obafemi Awolowo University,Department of Computer Science and Engineering,Ile - Ife,Nigeria","institution_ids":["https://openalex.org/I45711476"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Obafemi Awolowo University, Ile - Ife, Nigeria","institution_ids":["https://openalex.org/I45711476"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042578241","display_name":"Ganiyu A. Aderounmu","orcid":"https://orcid.org/0000-0002-7992-514X"},"institutions":[{"id":"https://openalex.org/I45711476","display_name":"Obafemi Awolowo University","ror":"https://ror.org/04snhqa82","country_code":"NG","type":"education","lineage":["https://openalex.org/I45711476"]}],"countries":["NG"],"is_corresponding":false,"raw_author_name":"Ganiyu A. Aderounmu","raw_affiliation_strings":["Obafemi Awolowo University,Department of Computer Science and Engineering,Ile - Ife,Nigeria","Department of Computer Science and Engineering, Obafemi Awolowo University, Ile - Ife, Nigeria"],"affiliations":[{"raw_affiliation_string":"Obafemi Awolowo University,Department of Computer Science and Engineering,Ile - Ife,Nigeria","institution_ids":["https://openalex.org/I45711476"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Obafemi Awolowo University, Ile - Ife, Nigeria","institution_ids":["https://openalex.org/I45711476"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5026774876"],"corresponding_institution_ids":["https://openalex.org/I4210161785"],"apc_list":null,"apc_paid":null,"fwci":0.4582,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.73463016,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"15","issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9818999767303467,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9796000123023987,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.805077075958252},{"id":"https://openalex.org/keywords/naive-bayes-classifier","display_name":"Naive Bayes classifier","score":0.6757904887199402},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.6017656326293945},{"id":"https://openalex.org/keywords/sql-injection","display_name":"SQL injection","score":0.5710278749465942},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.564808189868927},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.49991369247436523},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4646000564098358},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.2812309265136719},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.12967327237129211},{"id":"https://openalex.org/keywords/search-engine","display_name":"Search engine","score":0.10911750793457031}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.805077075958252},{"id":"https://openalex.org/C52001869","wikidata":"https://www.wikidata.org/wiki/Q812530","display_name":"Naive Bayes classifier","level":3,"score":0.6757904887199402},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.6017656326293945},{"id":"https://openalex.org/C150451098","wikidata":"https://www.wikidata.org/wiki/Q506059","display_name":"SQL injection","level":5,"score":0.5710278749465942},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.564808189868927},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.49991369247436523},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4646000564098358},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.2812309265136719},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.12967327237129211},{"id":"https://openalex.org/C97854310","wikidata":"https://www.wikidata.org/wiki/Q19541","display_name":"Search engine","level":2,"score":0.10911750793457031},{"id":"https://openalex.org/C164120249","wikidata":"https://www.wikidata.org/wiki/Q995982","display_name":"Web search query","level":3,"score":0.0},{"id":"https://openalex.org/C194222762","wikidata":"https://www.wikidata.org/wiki/Q114486","display_name":"Query by Example","level":4,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icecet58911.2023.10389469","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icecet58911.2023.10389469","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Conference on Electrical, Computer and Energy Technologies (ICECET)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W1978574287","https://openalex.org/W2024428474","https://openalex.org/W2169670869","https://openalex.org/W2756291343","https://openalex.org/W2804345915","https://openalex.org/W2962986000","https://openalex.org/W2995197063","https://openalex.org/W2998505996","https://openalex.org/W3013619299","https://openalex.org/W3014674838","https://openalex.org/W3035999996","https://openalex.org/W3047856396","https://openalex.org/W3104241163","https://openalex.org/W3127240323","https://openalex.org/W3129274064","https://openalex.org/W3144088395","https://openalex.org/W3146604247","https://openalex.org/W3155665621","https://openalex.org/W3167339165","https://openalex.org/W3197475302","https://openalex.org/W4210548407","https://openalex.org/W4250813457","https://openalex.org/W4250898226","https://openalex.org/W4285143817","https://openalex.org/W4285193688","https://openalex.org/W4292850490","https://openalex.org/W4300960357","https://openalex.org/W4300960382","https://openalex.org/W4310585678","https://openalex.org/W4312032565","https://openalex.org/W4360921620","https://openalex.org/W4386159279","https://openalex.org/W6991579763"],"related_works":["https://openalex.org/W2978656898","https://openalex.org/W2384863017","https://openalex.org/W2168262281","https://openalex.org/W2195741790","https://openalex.org/W2946194793","https://openalex.org/W2519472095","https://openalex.org/W1989494794","https://openalex.org/W2122031327","https://openalex.org/W1184238669","https://openalex.org/W3032901101"],"abstract_inverted_index":{"The":[0,33,69,133,214,234],"likelihood":[1],"of":[2,45,71,106,148,173,226,232,252],"online":[3],"threats,":[4],"specifically":[5],"Structured":[6],"Query":[7],"Language":[8],"Injection":[9],"Attacks":[10],"(SQLIA),":[11],"has":[12,240],"been":[13],"steadily":[14],"increasing.":[15],"These":[16],"attacks":[17],"involve":[18],"stealing":[19],"personal":[20],"information":[21],"from":[22],"vulnerable":[23],"web":[24,246],"application":[25,247],"databases,":[26],"thereby":[27],"posing":[28],"a":[29,104,178,222],"serious":[30],"security":[31,251],"risk.":[32],"existing":[34],"solutions":[35],"for":[36,42,78,127,141,242],"mitigating":[37,243],"SQLIA":[38,244],"do":[39],"not":[40],"account":[41],"other":[43],"types":[44],"injection":[46],"attacks,":[47],"such":[48],"as":[49,84,110,165,167,207,209],"buffer":[50],"overflow":[51],"and":[52,67,75,90,97,114,130,248],"database":[53],"fingerprinting.":[54],"Additionally,":[55],"the":[56,85,138,174,186,238],"algorithms":[57,147,176],"used":[58],"to":[59,112,124,249],"develop":[60],"these":[61,95],"models":[62],"may":[63],"be":[64],"biased,":[65],"subjective,":[66],"judgmental.":[68],"availability":[70],"data-driven":[72],"data":[73,77,86,99],"sets":[74,87],"historical":[76],"training":[79,224],"classifiers":[80],"also":[81],"presents":[82],"challenges,":[83],"are":[88,152],"limited":[89],"often":[91],"outdated.":[92],"To":[93],"address":[94],"issues":[96],"ensure":[98,250],"security,":[100],"this":[101],"study":[102],"utilized":[103],"subset":[105],"Artificial":[107],"Intelligence":[108],"known":[109],"ML":[111,123,175],"predict":[113],"prevent":[115],"SQLIA.":[116],"Data":[117],"mining":[118],"paradigms":[119],"were":[120],"employed":[121],"using":[122,137,177],"determine":[125],"classes":[126],"both":[128],"Malicious":[129],"Benign":[131],"data.":[132],"dataset":[134],"was":[135,218],"analyzed":[136],"Waikato":[139],"Environment":[140],"Knowledge":[142],"Analysis":[143],"(WEKA)":[144],"with":[145,192,221],"six":[146],"machine":[149],"learning":[150],"which":[151],"Logistic":[153],"Regression,":[154],"Naive":[155],"Bayes,":[156],"Bayes":[157],"Network,":[158],"Instance":[159],"Based":[160],"Learner,":[161],"Stochastic":[162],"Gradient":[163],"Descent":[164],"well":[166,208],"Sequential":[168],"Minimal":[169],"Optimization.":[170],"Performance":[171],"evaluation":[172],"10-fold":[179],"cross-validation":[180],"approach":[181],"revealed":[182],"that":[183,237],"IBK":[184],"is":[185],"best":[187],"classifier,":[188],"achieving":[189],"impressive":[190],"results":[191],"99.999%":[193],"accuracy,":[194],"100.00%":[195,203],"true":[196,204],"negative":[197,212],"(TN),":[198],"0.01%":[199],"false":[200,211],"positive":[201,205],"(FP),":[202],"(TP),":[206],"0.00%":[210],"(FN).":[213],"model":[215,223,239],"building":[216],"time":[217,225],"0.06":[219],"second,":[220],"0.012":[227],"second":[228],"in":[229,245],"cross":[230],"validation":[231],"10-fold.":[233],"outputs":[235],"show":[236],"potentials":[241],"databases.":[253]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-25T23:11:45.687758","created_date":"2025-10-10T00:00:00"}
