Research Article
Research on SQL Injection Attack and Defense Technology of Power Dispatching Data Network: Based on Data Mining
Table 3
Statistical quantity of different methods under the detection of missing report rate.
| Total number of requests | Actual number of SQL injection attacks | Number of missing reports of this method | Number of missing reports of the keyword filtering method | Number of missing reports of the filtering method based on the SQL syntax tree |
| 200 | 100 | 3 | 4 | 5 | 400 | 200 | 5 | 16 | 9 | 600 | 300 | 6 | 19 | 15 | 1000 | 500 | 8 | 25 | 28 | 2000 | 1000 | 15 | 35 | 51 | 5000 | 2500 | 20 | 43 | 113 | 10000 | 5000 | 49 | 80 | 232 | 20000 | 10000 | 89 | 325 | 405 | 50000 | 25000 | 570 | 1356 | 1536 | 100000 | 50000 | 895 | 2236 | 2142 | 200000 | 100000 | 1124 | 5515 | 5823 |
|
|