{"created":"2025-01-18T23:36:35.270070+00:00","updated":"2025-01-21T18:49:08.589380+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00082838","sets":["1164:2735:6701:6817"]},"path":["6817"],"owner":"11","recid":"82838","title":["A Learning Algorithm of Threshold Value on the Automatic Detection of SQL Injection Attack"],"pubdate":{"attribute_name":"公開日","attribute_value":"2012-07-09"},"_buckets":{"deposit":"85cf68fd-d7be-4ccc-8d14-1fa3f03d3a35"},"_deposit":{"id":"82838","pid":{"type":"depid","value":"82838","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"A Learning Algorithm of Threshold Value on the Automatic Detection of SQL Injection Attack","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"A Learning Algorithm of Threshold Value on the Automatic Detection of SQL Injection Attack"},{"subitem_title":"A Learning Algorithm of Threshold Value on the Automatic Detection of SQL Injection Attack","subitem_title_language":"en"}]},"item_type_id":"4","publish_date":"2012-07-09","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"Faculty of Information Technology and Business, Cyber University"},{"subitem_text_value":"Faculty of Information Technology and Business, Cyber University"},{"subitem_text_value":"Faculty of Information Technology and Business, Cyber University"},{"subitem_text_value":"Research Institute for Science and Engineering, Waseda University"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Faculty of Information Technology and Business, Cyber University","subitem_text_language":"en"},{"subitem_text_value":"Faculty of Information Technology and Business, Cyber University","subitem_text_language":"en"},{"subitem_text_value":"Faculty of Information Technology and Business, Cyber University","subitem_text_language":"en"},{"subitem_text_value":"Research Institute for Science and Engineering, Waseda University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/82838/files/IPSJ-MPS12089010.pdf"},"date":[{"dateType":"Available","dateValue":"2014-07-09"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-MPS12089010.pdf","filesize":[{"value":"435.4 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"17"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"6b3bae74-6576-421b-b7ed-a951afd89f1d","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2012 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Daiki, Koizumi"},{"creatorName":"Takeshi, Matsuda"},{"creatorName":"Michio, Sonoda"},{"creatorName":"Shigeichi, Hirasawa"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Daiki, Koizumi","creatorNameLang":"en"},{"creatorName":"Takeshi, Matsuda","creatorNameLang":"en"},{"creatorName":"Michio, Sonoda","creatorNameLang":"en"},{"creatorName":"Shigeichi, Hirasawa","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN10505667","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"The SQL injection attack causes very serious problem to web applications which have database including personal data. To detect the SQL injection attack, the parsing and the black list based on the existed attack have been widely used. Those approaches, however, have some problems in terms of the size of list or calculation costs as the number of attacks increases. For this point, the authors have previously proposed a simple automatic detection algorithm of SQL injection attack. This algorithm requires to calculate the contained rate of suspicious characters with input sequence. This rate would be compared with a known real-valued threshold. This paper proposes the learning algorithm to choose the real-valued threshold from training data sets. Furthermore, some criteria would be considered and their performances would also be examined.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"The SQL injection attack causes very serious problem to web applications which have database including personal data. To detect the SQL injection attack, the parsing and the black list based on the existed attack have been widely used. Those approaches, however, have some problems in terms of the size of list or calculation costs as the number of attacks increases. For this point, the authors have previously proposed a simple automatic detection algorithm of SQL injection attack. This algorithm requires to calculate the contained rate of suspicious characters with input sequence. This rate would be compared with a known real-valued threshold. This paper proposes the learning algorithm to choose the real-valued threshold from training data sets. Furthermore, some criteria would be considered and their performances would also be examined.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"6","bibliographic_titles":[{"bibliographic_title":"研究報告数理モデル化と問題解決(MPS)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2012-07-09","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"10","bibliographicVolumeNumber":"2012-MPS-89"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"id":82838,"links":{}}