A detection method, system and computer processing equipment for sql injection attack
A technology of injection attack and detection method, applied in the Internet field, can solve the problems of low SQL detection accuracy, low accuracy, high false alarm rate, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0042]While the flowchart describes the operations described in order, many of them can be implemented in parallel, concurrently or simultaneously. The order in which each operation can be rearranged. Processing can be terminated when its operation is completed, but may also have additional steps not included in the drawings. Processing can correspond to methods, functions, procedures, subroutines, subroutines, and more.
[0043]Computer devices include user equipment and network devices. Among them, user equipment or clients include, but are not limited to, computer, smartphones, PDAs, etc .; network devices include, but are not limited to, a single network server, a server group consisting of multiple web servers or a cloud computing by a large number of computer or web servers cloud. The computer device can operate alone to implement the present invention, and can also access the network and achieve the present invention by interacting with other computer devices in the network. The...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

