Google AI Professional Certificate - Learn AI Skills That Get You Hired
AI Engineer - Learn how to integrate AI into software applications
Overview
Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Explore a 25-minute conference talk that delves into the evolution of SQL injection attacks over the past two decades and introduces innovative data mining techniques for enhancing web attack detection. Learn how Content Delivery Network (CDN) logs can be leveraged to refine and optimize security rules, improve detection of future attacks, and identify emerging threats targeting new vulnerabilities. Discover the application of Natural Language Processing (NLP) elements in analyzing SQL injection payloads, including cleaning, curating, and breaking them down into keywords to uncover valuable insights. Follow a comprehensive five-step process for collecting data, choosing keywords, creating matrices, establishing relationships, and clustering information. Gain practical knowledge through a real-world example that demonstrates the effectiveness of these advanced techniques in combating SQL injection attacks.
Syllabus
Intro
Background
Theory
Denial of Service
New Skills
Five Step Process
Step 1 Collecting Data
Step 2 Choosing Keywords
Step 3 The Matrix
Step 4 The Relationship
Step 5 Clustering
Step 6 Real World Example
Taught by
OWASP Foundation