click here to download project abstract
ABSTRACT
Web application attacks are incessantly increasing in number and in severity. The big
data available on the internet motivates hackers to launch new kind of attacks. As
announced by the OWASP organization, injection attack has been the first of the top 10
security vulnerabilities, and SQL injection attack is one of the most important types.
This attack represents a serious threat to the web applications. SQL is a
communication medium between Web application and back end database. So the
mostly attackers use SQL for accessing a database. SQL injection can cause great
harm to the network, resulting in data leakage and website paralysis.
Injection attack is one of the best 10 security dangers declared by OWASP. SQL
infusion is one of the main types of attack. In light of their assorted and quick nature,
SQL injection can detrimentally affect the line, prompting broken and public data on the
site. Therefore, this article presents a profound woodland-based technique for
recognizing complex SQL attacks. Research shows that the methodology we use
resolves the issue of expanding and debasing the first condition of the woodland. We
are currently presenting the AdaBoost profound timberland-based calculation, which
utilizes a blunder level to refresh the heaviness of everything in the classification.
vi
TABLE OF CONTENTS
CHAPTER NO
TITLE
PAGE NO
ABSTRACT
vi
LIST OF FIGURES
ix
1
INTRODUCTION:
1
1.1 OVERVIEW OF THE PROJECT
1
1.2 OBJECTIVE OF THE PROJECT
2
2
LITERATURE SURVEY:
3
2.1 RELATED WORK
3
3
AIM AND SCOPE OF PRESENT
IMPLEMENTATION:
6
3.1 AIM AND SCOPE
6
3.2 EXISTING SYSTEM
6
3.2.1 DISADVANTAGES OF EXISTING
SYSTEM
6
3.3 PROPOSED SYSTEM
6
3.3.1 ADVANTAGES OF PROPOSED
SYSTEM
7
vii
3.4 ARCHITECTURE
7
3.5 REQUIREMENTS
8
3.5.1 HARDWARE REQUIREMENTS
8
3.5.2 SOFTWARE REQUIREMENTS
8
3.5.3 LIBRARIES REQUIRED
8
3.6 SAMPLE INPUT
8
4
METHODOLOGY:
9
4.1 SCEMATIC PROCESS
9
4.2 MODEL IMPLEMENTATION
9
4.3 ADAPTIVE DEEP FOREST
10
5
RESULT AND DISCUSSION
PERFORMANCE ANALYSIS:
12
5.1 RESULT ANALYSIS
12
6
SUMMARY AND CONCLUSIONS:
15
6.1 CONCLUSION
15
6.2 FUTURE WORK
15
REFERENCES
16