Research Article
Research on SQL Injection Attack and Defense Technology of Power Dispatching Data Network: Based on Data Mining
Table 2
Statistical quantity of different methods under false positive rate detection.
| Total number of requests | Actual number of SQL injection attacks | Number of false positives in this method | Number of false positives of the keyword filtering method | Number of false positives of the filtering method based on the SQL syntax tree |
| 200 | 100 | 1 | 6 | 18 | 400 | 200 | 3 | 15 | 38 | 600 | 300 | 7 | 19 | 58 | 1000 | 500 | 10 | 36 | 98 | 2000 | 1000 | 21 | 62 | 189 | 5000 | 2500 | 53 | 151 | 476 | 10000 | 5000 | 97 | 296 | 952 | 20000 | 10000 | 189 | 558 | 186 | 50000 | 25000 | 521 | 3552 | 476 | 100000 | 50000 | 1210 | 7362 | 896 | 200000 | 100000 | 1983 | 19320 | 1993 |
|
|