Attack type | |||||||||
---|---|---|---|---|---|---|---|---|---|
Ref. | Boolean-based SQLI | Union-based SQLI | Error-based SQLI | Batch query SQLI | Like-based SQLI | XSS | Encoded injection | ||
Methodology | Using pattern matching algorithm | [21] | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | X |
[22] | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | X | ||
[23] | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | X | ||
[24] | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | X | ||
[25] | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | X | ||
[26] | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | X | ||
[27] | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | X | ||
Using data encryption algorithm | [28] | ✓ | ✓ | ✓ | ✓ | ✓ | X | ✓ | |
[18] | ✓ | ✓ | ✓ | ✓ | ✓ | X | ✓ | ||
[29] | ✓ | ✓ | ✓ | ✓ | ✓ | X | ✓ | ||
[30] | ✓ | ✓ | ✓ | ✓ | ✓ | X | ✓ | ||
[31] | ✓ | ✓ | ✓ | ✓ | ✓ | X | ✓ | ||
[32] | ✓ | ✓ | ✓ | ✓ | ✓ | X | ✓ | ||
ISR | [12] | ✓ | ✓ | ✓ | ✓ | ✓ | X | X | |
[33] | ✓ | ✓ | ✓ | ✓ | ✓ | X | X | ||
Proposed algorithm | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |