Главная
Study mode:
on
1
Intro
2
Background
3
Theory
4
Denial of Service
5
New Skills
6
Five Step Process
7
Step 1 Collecting Data
8
Step 2 Choosing Keywords
9
Step 3 The Matrix
10
Step 4 The Relationship
11
Step 5 Clustering
12
Step 6 Real World Example
Description:
Explore a 25-minute conference talk that delves into the evolution of SQL injection attacks over the past two decades and introduces innovative data mining techniques for enhancing web attack detection. Learn how Content Delivery Network (CDN) logs can be leveraged to refine and optimize security rules, improve detection of future attacks, and identify emerging threats targeting new vulnerabilities. Discover the application of Natural Language Processing (NLP) elements in analyzing SQL injection payloads, including cleaning, curating, and breaking them down into keywords to uncover valuable insights. Follow a comprehensive five-step process for collecting data, choosing keywords, creating matrices, establishing relationships, and clustering information. Gain practical knowledge through a real-world example that demonstrates the effectiveness of these advanced techniques in combating SQL injection attacks.

Over 20 Years of SQL Injection Attacks - Refining Web Attack Detection Using Data Mining Techniques

OWASP Foundation
Add to list