Research Article

Neutralizing SQL Injection Attack Using Server Side Code Modification in Web Applications

Table 1

Comparative analysis of the proposed method on different databases.

DatabasesAUC (%)FAR (%)GAR (%)

TECAPI Attack Vectors91.8413.5186.54
HTTP dataset CSIC 201098.0511.4489.61