Machine Learning for SQL injection prevention on server-side scripting

Author(s):  
Krit Kamtuo ◽  
Chitsutha Soomlek
Author(s):  
Madhubala Kamble

Nowadays, standard intake of healthy food is vital for keeping a diet to avoid obesity within the human body . In this paper, we present a totally unique system supported machine learning that automatically performs accurate classification of food images and estimates food attributes. This paper proposes a machine learning model consisting of a support vector machine that classifies food into specific categories within the training a part of the prototype system. The most purpose of the proposed method is to reinforce the accuracy of the pre-training model. The paper designs a prototype system supported the client server network model. The client sends an image detection request and processes it on the server side. The prototype system is meant with three main software components, including a pre-trained support vector machine training module for classification purposes, a text data training module for attribute estimation models, and a server-side module. We experimented with a selection of food categories, each containing thousands of images, and therefore the machine learning training to understand higher classification accuracy.


2021 ◽  
Author(s):  
Han Cao ◽  
Youcheng Zhang ◽  
Jan Baumbach ◽  
Paul R Burton ◽  
Dominic Dwyer ◽  
...  

Multitask learning allows the simultaneous learning of multiple 'communicating' algorithms. It is increasingly adopted for biomedical applications, such as the modeling of disease progression. As data protection regulations limit data sharing for such analyses, an implementation of multitask learning on geographically distributed data sources would be highly desirable. Here, we describe the development of dsMTL, a computational framework for privacy-preserving, distributed multi-task machine learning that includes three supervised and one unsupervised algorithms. dsMTL is implemented as a library for the R programming language and builds on the DataSHIELD platform that supports the federated analysis of sensitive individual-level data. We provide a comparative evaluation of dsMTL for the identification of biological signatures in distributed datasets using two case studies, and evaluate the computational performance of the supervised and unsupervised algorithms. dsMTL provides an easy-to-use framework for privacy-preserving, federated analysis of geographically distributed datasets, and has several application areas, including comorbidity modeling and translational research focused on the simultaneous prediction of different outcomes across datasets. dsMTL is available at https://github.com/transbioZI/dsMTLBase (server-side package) and https://github.com/transbioZI/dsMTLClient (client-side package).


Author(s):  
Tetiana Naumenko ◽  
Vadym Chernomaz

Introduction. The widespread use of the Internet leads to a fast increase of the quantity of data that goes into it. This generates interest in intruders which try different approaches to steal this data. One of the most popular approaches is SQL injection. There are a lot of measures which help to prevent and decrease the risk of being subjected to this attack: usage of code analysis tools, usage of firewalls which can filter dangerous traffic etc. Usage of reverse proxy is analysed in this article, which with the help of machine learning algorithms checks requests for SQL injections and based on the result passes or forbids the request to go. It is worth mentioning that such a solution is not a replacement of human expertise but addition to it, which with the help of big data can give an accurate result in most cases. The purpose of the paper is to analyse and show effectiveness of usage of machine learning in information system security provisioning tasks with the system working in serverless architecture. Results. A system is designed and developed which with the help of machine learning classifies received requests. The system is deployed to the cloud hosting Google Cloud Platform and integrated into an application which is designed according to the serverless architecture principles. Multiple algorithms were used to compare effectiveness of the system and percentage of successful results were calculated for each of them. Also, an average time of request execution is calculated for each algorithm. Conclusions. Each algorithm’s result of successful request classification is above 90% which is considered to be more than acceptable. The result can be improved using more data to train machine learning models. The system fits for work in serverless applications thanks to the simplicity of its integration but it should be considered if it fits from a hardware rent point of view. Keywords: machine learning, Google Cloud Platform, security, SQL injection.


Sign in / Sign up

Export Citation Format

Share Document