
International Journal on Science and Technology
E-ISSN: 2229-7677
•
Impact Factor: 9.88
A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal
Plagiarism is checked by the leading plagiarism checker
Call for Paper
Volume 16 Issue 2
2025
Indexing Partners



















Detection and Prevention of SQL injection using Machine Learning Based Method
Author(s) | Brahmaniya Chetankumar Nareshkumar, Nimesh Vaidya |
---|---|
Country | India |
Abstract | Data is one type of most vital components or part of information systems machine learning which is mostly used and SQL injection is most commonly attacks on those days. Machine Learning is one type of programming language but it uses differently to compare with traditional programming. It uses to approach analysis is a great solution and also effective. Machine learning deals with structured and semi-structured data. Its included learning of new data and self-study to modify with existing and new data or dataset also learn the new things from the data. SQL injection attacks occurs when our web application having vulnerabilities or any loop holes in that also called bad things in programming which is easily attacker to do get login credentials to remotely control of whole under the attacker. |
Keywords | Machine Learning, SQL Injection |
Field | Computer > Network / Security |
Published In | Volume 16, Issue 2, April-June 2025 |
Published On | 2025-04-13 |
Cite This | Detection and Prevention of SQL injection using Machine Learning Based Method - Brahmaniya Chetankumar Nareshkumar, Nimesh Vaidya - IJSAT Volume 16, Issue 2, April-June 2025. DOI 10.71097/IJSAT.v16.i2.3572 |
DOI | https://doi.org/10.71097/IJSAT.v16.i2.3572 |
Short DOI | https://doi.org/g9fcfj |
Share this


CrossRef DOI is assigned to each research paper published in our journal.
IJSAT DOI prefix is
10.71097/IJSAT
Downloads
All research papers published on this website are licensed under Creative Commons Attribution-ShareAlike 4.0 International License, and all rights belong to their respective authors/researchers.
