Affiliation:
1. Department of Computer Science and Technology, Shenyang University of Chemical Technology, Shenyang, Liaoning 110142, China
Abstract
In the process of SQL injection attack and defense of power dispatching data network, in order to ensure the accuracy of identification and defense, it is often necessary to build a rule base. However, the scale of the temporarily constructed rule base is limited, which is easy to cause false positives and omissions. Based on the traditional defense, data mining technology is introduced to design a SQL injection attack and defense technology for power dispatching data network. First, the SQL injection attack is analyzed, and the attack flow diagram is obtained as the basis of attack identification. Using the ITFIDF algorithm in data mining technology, combined with the dataset distribution diagram of conventional words and sensitive characters, the SQL injection attack is detected. Design the SQL injection attack early warning mechanism, establish the SQL injection attack defense model, and optimize the workflow of the defense model. The performance test results show that compared with the traditional defense technology, the proposed technology has certain advantages in false alarm rate and running time.
Subject
Computer Networks and Communications,Computer Science Applications
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Study on SQL Injection Detection: AI-based Perspective;2023 International Conference on Energy, Materials and Communication Engineering (ICEMCE);2023-12-14
2. On Grid Resiliency: Cyber-Physical Detection Tool Evaluated in a Multi-Stage Attack Scenario;2023 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm);2023-10-31
3. Taxonomy of SQL Injection: ML Trends & Open Challenges;2023 IEEE 8th International Conference On Software Engineering and Computer Systems (ICSECS);2023-08-25
4. Digital Transformation of Microgrids: A Review of Design, Operation, Optimization, and Cybersecurity;Energies;2023-06-08