to download project abstract

ABSTRACT
Web application attacks are incessantly increasing in number and in severity. The big
data available on the internet motivates hackers to launch new kind of attacks. As
announced by the OWASP organization, injection attack has been the first of the top 10
security vulnerabilities, and SQL injection attack is one of the most important types.
This attack represents a serious threat to the web applications. SQL is a
communication medium between Web application and back end database. So the
mostly attackers use SQL for accessing a database. SQL injection can cause great
harm to the network, resulting in data leakage and website paralysis.
Injection attack is one of the best 10 security dangers declared by OWASP. SQL
infusion is one of the main types of attack. In light of their assorted and quick nature,
SQL injection can detrimentally affect the line, prompting broken and public data on the
site. Therefore, this article presents a profound woodland-based technique for
recognizing complex SQL attacks. Research shows that the methodology we use
resolves the issue of expanding and debasing the first condition of the woodland. We
are currently presenting the AdaBoost profound timberland-based calculation, which
utilizes a blunder level to refresh the heaviness of everything in the classification.

vi

TABLE OF CONTENTS
CHAPTER NO
TITLE
PAGE NO

ABSTRACT
vi

LIST OF FIGURES
ix
1
INTRODUCTION:
1

1.1 OVERVIEW OF THE PROJECT
1

1.2 OBJECTIVE OF THE PROJECT
2
2
LITERATURE SURVEY:
3

2.1 RELATED WORK
3
3
AIM AND SCOPE OF PRESENT
IMPLEMENTATION:
6

3.1 AIM AND SCOPE
6

3.2 EXISTING SYSTEM
6

3.2.1 DISADVANTAGES OF EXISTING
SYSTEM
6

3.3 PROPOSED SYSTEM
6

3.3.1 ADVANTAGES OF PROPOSED
SYSTEM
7
vii

3.4 ARCHITECTURE
7

3.5 REQUIREMENTS
8

3.5.1 HARDWARE REQUIREMENTS
8

3.5.2 SOFTWARE REQUIREMENTS
8

3.5.3 LIBRARIES REQUIRED
8

3.6 SAMPLE INPUT
8
4
METHODOLOGY:
9

4.1 SCEMATIC PROCESS
9

4.2 MODEL IMPLEMENTATION
9

4.3 ADAPTIVE DEEP FOREST
10
5
RESULT AND DISCUSSION
PERFORMANCE ANALYSIS:
12

5.1 RESULT ANALYSIS
12
6
SUMMARY AND CONCLUSIONS:
15

6.1 CONCLUSION
15

6.2 FUTURE WORK
15

REFERENCES
16

Leave a Comment

Comments

No comments yet. Why don’t you start the discussion?

Leave a Reply

Your email address will not be published. Required fields are marked *