﻿<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD with MathML3 v1.2 20190208//EN" "http://dtd.nlm.nih.gov/publishing/3.0/journalpublishing3.dtd">
<article
    xmlns:mml="http://www.w3.org/1998/Math/MathML"
    xmlns:xlink="http://www.w3.org/1999/xlink" dtd-version="3.0" xml:lang="en" article-type="article">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JAIBD</journal-id>
      <journal-title-group>
        <journal-title>Journal of Artificial Intelligence and Big Data</journal-title>
      </journal-title-group>
      <issn pub-type="epub">2771-2389</issn>
      <issn pub-type="ppub"></issn>
      <publisher>
        <publisher-name>Science Publications</publisher-name>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">10.31586/jaibd.2024.1333</article-id>
      <article-id pub-id-type="publisher-id">JAIBD-1333</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Article</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>
          Intelligent Detection of Injection Attacks via SQL Based on Supervised Machine Learning Models for Enhancing Web Security
        </article-title>
      </title-group>
      <contrib-group>
<contrib contrib-type="author">
<name>
<surname>Vadisetty</surname>
<given-names>Rahul</given-names>
</name>
<xref rid="af1" ref-type="aff">1</xref>
<xref rid="af2" ref-type="aff">2</xref>
<xref rid="af2" ref-type="aff">2</xref>
<xref rid="af2" ref-type="aff">2</xref>
<xref rid="cr1" ref-type="corresp">*</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Chinta</surname>
<given-names>Purna Chandra Rao</given-names>
</name>
<xref rid="af3" ref-type="aff">3</xref>
<xref rid="af2" ref-type="aff">2</xref>
<xref rid="af2" ref-type="aff">2</xref>
<xref rid="af2" ref-type="aff">2</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Moore</surname>
<given-names>Chethan Sriharsha</given-names>
</name>
<xref rid="af3" ref-type="aff">3</xref>
<xref rid="af2" ref-type="aff">2</xref>
<xref rid="af2" ref-type="aff">2</xref>
<xref rid="af2" ref-type="aff">2</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Karaka</surname>
<given-names>Laxmana Murthy</given-names>
</name>
<xref rid="af4" ref-type="aff">4</xref>
<xref rid="af2" ref-type="aff">2</xref>
<xref rid="af2" ref-type="aff">2</xref>
<xref rid="af2" ref-type="aff">2</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Sakuru</surname>
<given-names>Manikanth</given-names>
</name>
<xref rid="af5" ref-type="aff">5</xref>
<xref rid="af2" ref-type="aff">2</xref>
<xref rid="af2" ref-type="aff">2</xref>
<xref rid="af2" ref-type="aff">2</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Bodepudi</surname>
<given-names>Varun</given-names>
</name>
<xref rid="af6" ref-type="aff">6</xref>
<xref rid="af2" ref-type="aff">2</xref>
<xref rid="af2" ref-type="aff">2</xref>
<xref rid="af2" ref-type="aff">2</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Maka</surname>
<given-names>Srinivasa Rao</given-names>
</name>
<xref rid="af7" ref-type="aff">7</xref>
<xref rid="af2" ref-type="aff">2</xref>
<xref rid="af2" ref-type="aff">2</xref>
<xref rid="af2" ref-type="aff">2</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Vangala</surname>
<given-names>Srikanth Reddy</given-names>
</name>
<xref rid="af8" ref-type="aff">8</xref>
<xref rid="af2" ref-type="aff">2</xref>
<xref rid="af2" ref-type="aff">2</xref>
<xref rid="af2" ref-type="aff">2</xref>
</contrib>
      </contrib-group>
<aff id="af1"><label>1</label> Wayne State University, Master of Science, USA</aff>
<aff id="af2"><label>2</label> Microsoft, Support Escalation Engineer, USA</aff>
<aff id="af3"><label>3</label> Code Ace Solutions Inc, Software Engineer, USA</aff>
<aff id="af4"><label>4</label> JP Morgan Chase, Lead Software Engineer, USA</aff>
<aff id="af5"><label>5</label> Deloitte Consulting LLP, Senior Solution Specialist, USA</aff>
<aff id="af6"><label>6</label> North Star Group Inc, Software Engineer, USA</aff>
<aff id="af7"><label>7</label> Department of Computer Science, University of Bridgeport, USA</aff>
<author-notes>
<corresp id="c1">
<label>*</label>Corresponding author at: Wayne State University, Master of Science, USA
</corresp>
</author-notes>
      <pub-date pub-type="epub">
        <day>19</day>
        <month>12</month>
        <year>2024</year>
      </pub-date>
      <volume>4</volume>
      <issue>2</issue>
      <history>
        <date date-type="received">
          <day>27</day>
          <month>08</month>
          <year>2024</year>
        </date>
        <date date-type="rev-recd">
          <day>23</day>
          <month>10</month>
          <year>2024</year>
        </date>
        <date date-type="accepted">
          <day>26</day>
          <month>11</month>
          <year>2024</year>
        </date>
        <date date-type="pub">
          <day>19</day>
          <month>12</month>
          <year>2024</year>
        </date>
      </history>
      <permissions>
        <copyright-statement>&#xa9; Copyright 2024 by authors and Trend Research Publishing Inc. </copyright-statement>
        <copyright-year>2024</copyright-year>
        <license license-type="open-access" xlink:href="http://creativecommons.org/licenses/by/4.0/">
          <license-p>This work is licensed under the Creative Commons Attribution International License (CC BY). http://creativecommons.org/licenses/by/4.0/</license-p>
        </license>
      </permissions>
      <abstract>
        The most prevalent technique behind security data breaches exists through SQL Injection Attacks. Organizations and individuals suffer from sensitive information exposure and unauthorized entry when attackers take advantage of SQL injection (SQLi) attack vulnerability&#x02019;s severe risks. Static and heuristic defense methods remain conventional detection tools for previous SQL injection attacks study's foundation is a detection system developed using the Gated Recurrent Unit (GRU) network, which attempts to efficiently identify SQL Injection attacks (SQLIAs). The suggested Gated Recurrent Unit model was trained using an 80:20 train-test split, and the results showed that SQL injection attacks could be accurately identified with a precision rate of 97%, an accuracy rate of 96.65%, a recall rate of 92.5%, and an F1-score of 94%. The experimental results, together with their corresponding confusion matrix analysis and learning curves, demonstrate resilience and outstanding generalization ability. The GRU model outperforms conventional machine learning (ML) models, including K-Nearest Neighbor&#x02019;s (KNN), and Support Vector Machine (SVM), in terms of identifying sequential patterns in SQL query data. Recurrent neural architecture proves effective in the detection of SQLi attacks through its ability to provide secure protection for contemporary web applications.
      </abstract>
      <kwd-group>
        <kwd-group><kwd>Web Application Security</kwd>
<kwd>Cyberattacks</kwd>
<kwd>SQL Injection Attacks (SQLIA)</kwd>
<kwd>Machine Learning (ML)</kwd>
<kwd>SQL Injection Dataset</kwd>
</kwd-group>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec1">
<title>Introduction</title><p>The modern world relies heavily on web applications since they serve as vital tools for executing business operations and delivering government services, and conducting personal activities. Online banking, along with e-commerce and healthcare portals and educational platforms, have become fundamental structures that enable multiple business sectors to work efficiently and manage data and deliver services. Organizations now depend extensively on web-based technologies, prompting a critical need for system protection due to its vital importance [
<xref ref-type="bibr" rid="R1">1</xref>]. The expanding nature of web applications leads to increased attacks that exploit weaknesses to interrupt services while simultaneously stealing sensitive information and damaging organizational credibility [
<xref ref-type="bibr" rid="R2">2</xref>]. </p>
<p>The SQLIAs stand as one of the most dangerous and widely used cyber threats among other forms [
<xref ref-type="bibr" rid="R3">3</xref>]. SQLIAs function through invalid field input to embed damaging SQL code that lets attackers avoid security measures and obtain sensitive data while also facilitating database changes and removals. Security professionals face SQLi attacks as a major ongoing threat since web application vulnerabilities lead to them in over 65% of cases [
<xref ref-type="bibr" rid="R4">4</xref>].</p>
<p>Web security enhancement alongside risk mitigation depends heavily on successful research into SQLi attack detection. The detection capability of traditional input validation combined with signature-based systems fails to detect modern or advanced variations of SQLIAs [
<xref ref-type="bibr" rid="R5">5</xref>]. Web application security enhancement demands a proper detection system for SQLIAs. Most modern injection techniques remain undetected by traditional protection measures, which combine input validation and static rule enforcement. </p>
<p>The detection accuracy, along with false positive reduction, has motivated researchers to adopt ML and DL models due to their adaptive and intelligent features [
<xref ref-type="bibr" rid="R6">6</xref>]. The combination of supervised machine and DL models can become a successful method for efficient SQLi attack detection in web security systems [
<xref ref-type="bibr" rid="R7">7</xref>]. The system uses learned models to extract knowledge from past SQL query data, which includes harmless as well as harmful requests, enabling automatic detection of potential threats during real-time processing.</p>
<title>1.1. Motivation and Contribution of Paper</title><p>The security threat from SQLi bypasses conventional detection techniques while maintaining its importance as a critical web application vulnerability. Current rule-based detection systems experience difficulties when trying to identify complicated and emerging SQLi attack forms. Detecting of diverse SQLi attacks in real-time requires new technology because existing systems lack smart enough detection capabilities. The research introduces a complete structure for SQLi attack detection through DL methodology. The key contributions are as follows:</p>
<p>Utilized a Kaggle SQLi dataset with over 30,000 SQL queries, including ~6,000 malicious entries across multiple SQLi types. </p>
<p>Applied comprehensive preprocessing, duplicate removal, missing value handling, tokenization, encoding, and normalization. </p>
<p>Performed feature selection using G-test scoring to enhance classification accuracy. </p>
<p>Developed a GRU-based DL model for sequential analysis of SQL queries.</p>
<p>Utilizing the disorientation matrix's accuracy, precision, f1-score, and recall, evaluate the model's efficiency.</p>
<title>1.2. Structure of paper</title><p>The remainder of the document is structured. Section II provides a background study on the Detection of SQLi Attacks. In Section III, the methodology&#x26;#x000a0;that proposed in detailed. In Section V, the outcomes, analysis, and discussion are compared. Section V presents the study's conclusion and plans for further research.</p>
</sec><sec id="sec2">
<title>Literature Review</title><p>A few significant studies that are connected to the Detection of SQLIAs for Enhancing Web Security are examined and filtered in order to carry out the present task.Table <xref ref-type="table" rid="tabI">I</xref> provides a concise comparison of key research works on SQLi detection using ML, highlighting proposed methods, datasets used, key findings, and identified challenges. </p>
<p>Hasan, Balbahaith and Tarique (2019) developed a heuristic technique built around ML to stop SQLi attacks. It trains and evaluates 23 distinct ML classifications using a dataset of 616 SQL expressions. It builds a top five classifiers served as the foundation for the Graphical User Interface (GUI) application amongst the ones mentioned above, chosen for their identification accuracy. The results of testing the suggested technique demonstrate that it can recognize SQLIAs with a from head to foot grade of accuracy (93.8%) [
<xref ref-type="bibr" rid="R8">8</xref>].</p>
<p>Noor et al. (2019) Based on documented attack patterns, a new ML-based approach is suggested to identify cyber risks. To create threats and TTPs obtained from reliable sources in a semantic network of malware with related detection methods. The system is trained on a dataset of TTP taxonomies and threat artefacts. Its performance is evaluated using threat notifications. Despite the implementation of fictitious and missing TTPs, the system remains in place and effectively detects attacks with a 92% accuracy rate and few FP. On average, an internet connection trained with 133 TTPs from 45 security domains detects data breaches in 0.15 seconds [
<xref ref-type="bibr" rid="R9">9</xref>].</p>
<p>Zhang (2019) introduces an ML classifier intended to find PHP code that has SQLi vulnerabilities. Using validation of input and sanitization attributes taken from source code files, algorithms for classifiers were trained and evaluated using both traditional and DL-based ML methods. A CNN-trained model had the best accuracy (95.4%) on ten-fold cross-verification, while the Multilayered Perceptron (MLP)-based model had the greatest level of recall (63.7%) and the strongest f parameter (0.746) [
<xref ref-type="bibr" rid="R10">10</xref>].</p>
<p>Ul Islam et al (2019) Create a supervised learning method to identify NoSQL injections. It uses a variety of supervised learning methods and designs key characteristics by hand. Their tool's cross-validation of 10 times yielded an F2-score of 0.93. Additionally, they tested their tool against NoSQL Map, a NoSQLi generating tool, and discovered that its detection percentage is 36.25% higher than that of Screen, which is the sole NoSQL intrusion identification tool currently on the market [
<xref ref-type="bibr" rid="R11">11</xref>].</p>
<p>McWhirter et al. (2018) offer a unique way to categorize queries made with SQL based just on the original query string's properties. Several test datasets taken from the Flashback testbed datasets are used to assess the suggested solution. For Select type operations, the demonstrating the applications accuracy was 97.07%, and for Insert type queries, it was 92.48%. This low success rate results from the characteristic process for extraction being confused by unclean quote marks in valid inputs [
<xref ref-type="bibr" rid="R12">12</xref>].</p>
<p>Chattopadhyay et al. (2018) The document investigates obstacles when implementing machine learning methods for attack identification systems. This paper investigates various built-in difficulties related to machine learning techniques for intrusion detection definition and execution methods. Their research evaluates multiple machine learning techniques against different datasets in order to select the optimal solution for changing usage patterns by utilizing diverse performance measurement metrics. The amount of data processed by servers has grown dramatically so their security becomes a top priority [
<xref ref-type="bibr" rid="R13">13</xref>].</p>
<p>Table 1 summarizes various ML-based approaches for SQL injection detection, highlighting methods, datasets, performance metrics, and limitations. While most achieve high accuracy, common challenges include small datasets, limited generalizability, scalability issues, and technology-specific constraints.</p>
<p></p>
<table-wrap id="tab1">
<label>Table 1</label>
<caption>
<p><b> </b><b>Summary of the study on Detection of SQL Injection Attacks using machine learning</b></p>
</caption>

<table>
<thead>
<tr>
<th align="center"><bold>Author</bold></th>
<th align="center"><bold>Proposed Work</bold></th>
<th align="center"><bold>Dataset</bold></th>
<th align="center"><bold>Key Findings</bold></th>
<th align="center"><bold>Challenges/Gaps</bold></th>
<th align="center"></th>
</tr>
</thead>
<tbody>
<tr>
<td align="center">Hasan,  Balbahaith, and Tarique (2019)</td>
<td align="center">Developed a  heuristic ML-based algorithm and GUI app using the top 5 of 23 classifiers</td>
<td align="center">616 SQL  statements</td>
<td align="center">Achieved 93.8%  accuracy in detecting SQLi attacks</td>
<td align="center">Small dataset  size; scalability to real-world scenarios not validated</td>
<td align="center"></td>
</tr>
<tr>
<td align="center">Noor et al.  (2019)</td>
<td align="center">suggested an  arrangement based on semantic ML to connect risks and TTPs via probabilistic  networks</td>
<td align="center">TTP taxonomy  dataset (133 TTPs, 45 threat families)</td>
<td align="center">Detected threats  with 92% accuracy; low false positives; 0.15s average detection time</td>
<td align="center">Specific to  TTP-based threats; generalization to SQLi-specific detection not tested</td>
<td align="center"></td>
</tr>
<tr>
<td align="center">Zhang (2019)</td>
<td align="center">Designed ML  classifiers (CNN, MLP) to detect SQLi vulnerabilities in PHP code using  code-level features</td>
<td align="center">PHP source code  files</td>
<td align="center">CNN achieved  95.4% precision; MLP achieved 63.7% recall and F-measure of 0.746</td>
<td align="center">Limited to PHP;  varying performance across different classifiers</td>
<td align="center"></td>
</tr>
<tr>
<td align="center">Ul Islam et al.  (2019)</td>
<td align="center">Created a NoSQL  injection supervised learning tool. detection with a novel dataset</td>
<td align="center">Custom-designed  NoSQL injection dataset</td>
<td align="center">Achieved 0.93  F2-score; outperformed Sqreen by 36.25%; database-agnostic</td>
<td align="center">Limited availability  of NoSQL datasets; manual feature engineering required</td>
<td align="center"></td>
</tr>
<tr>
<td align="center">McWhirter et al.  (2018)</td>
<td align="center">Gap-Weighted  String Subsequence was used. Kernel + SVM on SQL query strings for  classification</td>
<td align="center">Amnesia testbed  datasets</td>
<td align="center">Achieved 97.07%  (Select) and 92.48% (Insert) accuracy; adapted to unseen threats</td>
<td align="center">Lower accuracy  with unsanitized quotation marks; sensitive to input anomalies</td>
<td align="center"></td>
</tr>
<tr>
<td align="center">Chattopadhyay et  al. (2018)</td>
<td align="center">examined the  difficulties in implementing ML methods for identifying malware</td>
<td align="center">Multiple datasets  (unspecified)</td>
<td align="center">Compared various  ML techniques across datasets; summarized performance based on different  metrics; identified optimal techniques for evolving patterns.</td>
<td align="center">Lack of clarity  in dataset specifics; issues in defining and generalizing ML approaches to  dynamic, real-world intrusion patterns; scalability concerns.</td>
<td align="center"></td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<fn>

</fn>
</table-wrap-foot>
</table-wrap><p></p>
</sec><sec id="sec3">
<title>Research Methodology</title><p>The research design SQLi attack detection requires a methodical methodology that includes data collection, the preprocessing phase and model development, and performance evaluation that is illustrated inFigure <xref ref-type="fig" rid="fig1"> 1</xref>. Initially, the SQLi dataset sourced from Kaggle contains over 30,000 SQL queries. The dataset is rigorously pre-processed, which includes dealing with unavailable values, removing duplicates, tokenization of queries into logical components, numerical encoding, and normalization. Feature extraction is performed using G-test scoring to identify the most discriminative features relevant for classification. After that, a performance evaluation is carried out by training a GRU model on 80% of the data while testing is done on the remaining 20%. The model's effectiveness is measured using precision, accuracy recall, and F1-score, supported by visualizations like confusion matrix, accuracy and loss curves, highlighting the GRU model&#x26;#x02019;s superior ability to detect SQLi attacks compared to traditional ML models. </p>
<fig id="fig1">
<label>Figure 1</label>
<caption>
<p>Proposed flowchart for Detection of SQL Injection Attacks</p>
</caption>
<graphic xlink:href="1333.fig.001" />
</fig><p>Each step of a proposed flowchart for Detection of SQLi Attacks for Enhancing Web Security is provided below:</p>
<title>3.1. Data Collection</title><p>In this research, it uses the SQLi dataset from Kaggle. Most of the 30,919 query statements from various websites are "SELECT FROM" and similar SQL variations. The three forms of SQLi Union Based, Blunder Based, and Blind SQL Injections amount to around 6,000 in this dataset the correlation of data is shown inFigure <xref ref-type="fig" rid="fig2"> 2</xref>.</p>
<fig id="fig2">
<label>Figure 2</label>
<caption>
<p><b> </b>Feature Correlation Matrix</p>
</caption>
<graphic xlink:href="1333.fig.002" />
</fig><p>Figure 2 illustrates the correlations between various SQL query features using a color gradient from blue (negative) to red (positive). It highlights relationships among attributes like query length, SQL keywords, special characters, and logical operators. Diagonal values show perfect self-correlation, while off-diagonal elements reveal feature interdependencies. This visualization aids in understanding which characteristics commonly co-occur, offering insights for query analysis and security detection.</p>
<title>3.2. Data Preprocessing</title><p>During the data pre-processing step, SQL queries need sequential and numerical inputs to be properly prepared. The data preparation includes multiple steps, which start with tokenization and end with normalization, that ensure effective data structure. This procedure puts emphasis on dependent execution sequences because they enable the recognition of search patterns for SQLi attacks. The data pre-processing protocol includes the following sequential steps: </p>
<p><bold>Handle missing value:</bold> The algorithm replaces absent Numeric values by inputting the mean of column statistics to preserve original numerical centralities. </p>
<p><bold>Eliminating duplicate records:</bold> To prevent redundancy and overfitting during model training the technician removes duplicate entries from the records.</p>
<p><bold>Tokenization:</bold> The tokenization process divides SQL queries into key terms as well as relation operators and literal values and unique symbols. Through tokenization the system learns about typical keyword arrangements and SQL attack-related character sequences because it provides structure to sequence analysis.</p>
<p><bold>Numerical encoding:</bold> After tokenization, an embedding layer converts each token into a numerical identity, creating dense vector representations of syntactic and partially semantic relationships.</p>
<title>3.3. Feature Extraction with G-Test Scores</title><p>The G-test is a feature extraction method that evaluates the dependency between categorical features and the target variable. It uses a likelihood ratio to measure how much a feature&#x26;#x02019;s distribution differs across classes, selecting features with high scores for better model performance.</p>
<title>3.4. Data Normalization</title><p>Normalizing data is an essential component of training. There is a significant variation in the range of numerical figures in the collected data. Characteristics with such a wide range of values already have a much bigger impact on the classifier than characteristics with a narrower range of values; hence, a fraction (decimal) part of the information was omitted. Using the normalization Equation (1), it translates a given property to the interval &#x26;#x03010;0, 1&#x26;#x03011;: </p>

<disp-formula id="FD1"><div class="html-disp-formula-info"><div class="f"><math display="inline"><semantics><mrow><msub><mrow><mi>x</mi></mrow><mrow><mi>m</mi></mrow></msub><mo>-</mo><mfrac><mrow><mi>x</mi><mo>-</mo><msub><mrow><mi>x</mi></mrow><mrow><mi>m</mi><mi>i</mi><mi>n</mi></mrow></msub></mrow><mrow><msub><mrow><mi>x</mi></mrow><mrow><mi>m</mi><mi>a</mi><mi>x</mi></mrow></msub><mo>-</mo><msub><mrow><mi>x</mi></mrow><mrow><mi>m</mi><mi>i</mi><mi>n</mi></mrow></msub></mrow></mfrac></mrow></semantics></math></div><div class="l"><label>(1)</label></div></div></disp-formula><p>where <math><semantics><mrow><msub><mrow><mi>x</mi></mrow><mrow><mi>m</mi><mi>i</mi><mi>n</mi></mrow></msub></mrow></semantics></math> is the lowest of all the original features,<math><semantics><mrow><msub><mrow><mi>x</mi></mrow><mrow><mi>m</mi><mi>a</mi><mi>x</mi></mrow></msub></mrow></semantics></math> is the biggest of all the original features, and x is the value before the feature value is processed. The mapping interval's highest and lowest values are denoted by the terms high and low, appropriately</p>
<title>3.5. Data Splitting</title><p>The dataset is separated into two parts of size 80% and 20% for training and testing purposes, respectively.</p>
<title>3.6. Gated Recurrent Unit (GRU) Model</title><p>An LSTM neuronal network's additional time dedicated to training its models yields a more complicated internal structure and challenging parameter adjustment [
<xref ref-type="bibr" rid="R14">14</xref>]. GRU is a condensed form of an LSTM. The GRU model offers comparable prediction accuracy to the LSTM model while requiring fewer hours of training time. GRU reduces the merging of the memory&#x26;#x02019;s module to only two regulating components&#x26;#x02014;the current gate and the reset gate&#x26;#x02014;by combining the input and recollection gates of the LSTM into a single maintenance gate. The portal of updates is shown as <math><semantics><mrow><msub><mrow><mi>Z</mi></mrow><mrow><mi>t</mi></mrow></msub></mrow></semantics></math>, regulates how much information from the previous data state is incorporated into the current state. While the prior neuron handles fewer historical items, higher update gate values give current information precedence over past information. The main function of the apprise gates is to maintain memory and then identify extended patterns that occur in water quality data sequences. The capture process of information through the update gate utilizes the Equation (2) which shows:</p>

<disp-formula id="FD2"><div class="html-disp-formula-info"><div class="f"><math display="inline"><semantics><mrow><msub><mrow><mi>Z</mi></mrow><mrow><mi>t</mi></mrow></msub><mo>=</mo><mi>σ</mi><mfenced separators="|"><mrow><msub><mrow><mi>W</mi></mrow><mrow><mi>Z</mi></mrow></msub><mi mathvariant="normal">*</mi><mfenced open="[" close="]" separators="|"><mrow><msub><mrow><mi>h</mi></mrow><mrow><mi>t</mi><mo>-</mo><mn>1</mn></mrow></msub><mo>,</mo><msub><mrow><mi>X</mi></mrow><mrow><mi>t</mi></mrow></msub></mrow></mfenced></mrow></mfenced></mrow></semantics></math></div><div class="l"><label>(2)</label></div></div></disp-formula><p>The release gate component <math><semantics><mrow><msub><mrow><mi>R</mi></mrow><mrow><mi>t</mi></mrow></msub></mrow></semantics></math>, functions as a pivotal part in determining the amount of stored historical data. The retention of past historical data becomes more effective as reset gate values decrease since this setting helps identify short-term trends in parameterisation data on the condition of water. Equation (3) serves to compute the reset gate information that looks like this:</p>

<disp-formula id="FD3"><div class="html-disp-formula-info"><div class="f"><math display="inline"><semantics><mrow><msub><mrow><mi>R</mi></mrow><mrow><mi>t</mi></mrow></msub><mo>=</mo><mi>σ</mi><mfenced separators="|"><mrow><msub><mrow><mi>W</mi></mrow><mrow><mi>r</mi></mrow></msub><mi mathvariant="normal">*</mi><mfenced open="[" close="]" separators="|"><mrow><msub><mrow><mi>h</mi></mrow><mrow><mi>t</mi><mo>-</mo><mn>1</mn></mrow></msub><mo>,</mo><msub><mrow><mi>X</mi></mrow><mrow><mi>t</mi></mrow></msub></mrow></mfenced></mrow></mfenced></mrow></semantics></math></div><div class="l"><label>(3)</label></div></div></disp-formula><p>here <math><semantics><mrow><msub><mrow><mi>h</mi></mrow><mrow><mi>t</mi></mrow></msub></mrow></semantics></math>&#x26;#x000a0;represents the unit's emission state at time &#x26;#x0d835;&#x26;#x0dc61; and <math><semantics><mrow><msub><mrow><mover accent="true"><mrow><mi>h</mi></mrow><mo>-</mo></mover></mrow><mrow><mi>t</mi></mrow></msub></mrow></semantics></math> symbolizes the roundabout municipal value of <math><semantics><mrow><msub><mrow><mi>h</mi></mrow><mrow><mi>t</mi></mrow></msub></mrow></semantics></math>. The current unit data gets stored into this value before transmission but an estimate of the previous output needs calculation using Equation (4).</p>

<disp-formula id="FD4"><div class="html-disp-formula-info"><div class="f"><math display="inline"><semantics><mrow><msub><mrow><mover accent="true"><mrow><mi>h</mi></mrow><mo>-</mo></mover></mrow><mrow><mi>t</mi></mrow></msub><mo>=</mo><mi>t</mi><mi>a</mi><mi>n</mi><mi>h</mi><mfenced separators="|"><mrow><msub><mrow><mi>W</mi></mrow><mrow><mover accent="true"><mrow><mi>h</mi></mrow><mo>-</mo></mover></mrow></msub><mi mathvariant="normal">*</mi><mfenced open="[" close="]" separators="|"><mrow><msub><mrow><mi>r</mi></mrow><mrow><mi>t</mi></mrow></msub><mi mathvariant="normal">*</mi><msub><mrow><mi>h</mi></mrow><mrow><mi>t</mi><mo>-</mo><mn>1</mn></mrow></msub><mo>,</mo><msub><mrow><mi>X</mi></mrow><mrow><mi>t</mi></mrow></msub></mrow></mfenced></mrow></mfenced></mrow></semantics></math></div><div class="l"><label>(4)</label></div></div></disp-formula><p>The projected results for data on water quality parameters appear as Equation (5)</p>

<disp-formula id="FD5"><div class="html-disp-formula-info"><div class="f"><math display="inline"><semantics><mrow><msub><mrow><mi>h</mi></mrow><mrow><mi>t</mi></mrow></msub><mo>=</mo><mfenced separators="|"><mrow><mn>1</mn><mo>-</mo><msub><mrow><mi>Z</mi></mrow><mrow><mi>t</mi></mrow></msub></mrow></mfenced><mi mathvariant="normal">*</mi><msub><mrow><mi>h</mi></mrow><mrow><mi>t</mi><mo>-</mo><mn>1</mn></mrow></msub><mo>+</mo><msub><mrow><mi>Z</mi></mrow><mrow><mi>t</mi></mrow></msub><mi mathvariant="normal">*</mi><msub><mrow><mover accent="true"><mrow><mi>h</mi></mrow><mo>-</mo></mover></mrow><mrow><mi>t</mi></mrow></msub></mrow></semantics></math></div><div class="l"><label>(5)</label></div></div></disp-formula><p>here <math><semantics><mrow><msub><mrow><mi>X</mi></mrow><mrow><mi>t</mi></mrow></msub><mi mathvariant="normal"> </mi></mrow></semantics></math>denotes the numerical value of the supplied data at this time <math><semantics><mrow><msub><mrow><mi>t</mi></mrow><mrow><mi>t</mi></mrow></msub></mrow></semantics></math>,&#x26;#x000a0;<math><semantics><mrow><msub><mrow><mi>h</mi></mrow><mrow><mi>t</mi><mo>-</mo><mn>1</mn></mrow></msub></mrow></semantics></math>is the current memory cell's outcome for water's cleanliness characteristic data <math><semantics><mrow><mi>t</mi><mo>-</mo><mn>1</mn></mrow></semantics></math>, <math><semantics><mrow><msub><mrow><mi>W</mi></mrow><mrow><mi>Z</mi></mrow></msub><mo>,</mo><mi mathvariant="normal"> </mi><msub><mrow><mi>W</mi></mrow><mrow><mi>r</mi></mrow></msub><mo>,</mo></mrow></semantics></math>and <math><semantics><mrow><msub><mrow><mi>W</mi></mrow><mrow><mover accent="true"><mrow><mi>h</mi></mrow><mo>-</mo></mover></mrow></msub></mrow></semantics></math> indicate the cell's weight matrix, &#x26;#x0201c;&#x26;#x03010;&#x26;#x03011;&#x26;#x0201d; represents the relationship between two matrices, "&#x26;#x02217;" stands for the tanh procedure is the divided curves of the registration operation, and the matrix whose result is &#x26;#x003c3; is the participation constant.</p>
<title>3.7. Evaluation Metrics</title><p>The evaluation process for a classification model in ML consists of a confusion matrix, which takesTable <xref ref-type="table" rid="tabtable form"> table form</xref>. It is a matrix that summarizes the class labels for a collection of test data, both real and expected. The quantity of each class's TP, FP, TN, and FN is publicized in the confusion matrix. The amount of accurate predictions for the positive the number of accurate forecasts for the negative class is TN, the number of erroneous predictions for the positive class is FP, the number of incorrect estimations for the negative class is FN, and the class TP. Accuracy, precision, recall, and F1 score are among the assessment metrics that may be calculated using the confusion matrix.</p>
<p><bold>Accuracy:</bold> The Measure achieves correct predictions through Accuracy however, this method works less effectively when dealing with unbalanced datasets. It is given as Equation (6).</p>

<disp-formula id="FD6"><div class="html-disp-formula-info"><div class="f"><math display="inline"><semantics><mrow><mi>A</mi><mi>c</mi><mi>c</mi><mi>u</mi><mi>r</mi><mi>a</mi><mi>c</mi><mi>y</mi><mo>=</mo><mfrac><mrow><mi mathvariant="normal">T</mi><mi mathvariant="normal">P</mi><mo>+</mo><mi mathvariant="normal">T</mi><mi mathvariant="normal">N</mi></mrow><mrow><mi mathvariant="normal">T</mi><mi mathvariant="normal">P</mi><mo>+</mo><mi mathvariant="normal">F</mi><mi mathvariant="normal">p</mi><mo>+</mo><mi mathvariant="normal">T</mi><mi mathvariant="normal">N</mi><mo>+</mo><mi mathvariant="normal">F</mi><mi mathvariant="normal">N</mi></mrow></mfrac></mrow></semantics></math></div><div class="l"><label>(6)</label></div></div></disp-formula><p><bold>Precision:</bold> The focus of precision rests in determining accurate positive predictions to reduce false positives. The precision ratio measures positively predicted instances compared to all predicted instances for decision-making validity. It is expressed as Equation (7).</p>

<disp-formula id="FD7"><div class="html-disp-formula-info"><div class="f"><math display="inline"><semantics><mrow><mi>P</mi><mi>r</mi><mi>e</mi><mi>c</mi><mi>i</mi><mi>s</mi><mi>i</mi><mi>o</mi><mi>n</mi><mo>=</mo><mfrac><mrow><mi mathvariant="normal">T</mi><mi mathvariant="normal">P</mi></mrow><mrow><mi mathvariant="normal">T</mi><mi mathvariant="normal">P</mi><mo>+</mo><mi mathvariant="normal">F</mi><mi mathvariant="normal">P</mi></mrow></mfrac></mrow></semantics></math></div><div class="l"><label>(7)</label></div></div></disp-formula><p><bold>Recall:</bold> Model recall represents the ability to detect all positive cases effectively and avoid false negative errors. The mathematical expression of recall appears as Equation (8).</p>

<disp-formula id="FD8"><div class="html-disp-formula-info"><div class="f"><math display="inline"><semantics><mrow><mi>R</mi><mi>e</mi><mi>c</mi><mi>a</mi><mi>l</mi><mi>l</mi><mo>=</mo><mfrac><mrow><mi mathvariant="normal">T</mi><mi mathvariant="normal">P</mi></mrow><mrow><mi>T</mi><mi>P</mi><mo>+</mo><mi>F</mi><mi>N</mi></mrow></mfrac></mrow></semantics></math></div><div class="l"><label>(8)</label></div></div></disp-formula><p><bold>F1 score:</bold> F1-score determines evaluation control by combining precision and recall measurement to achieve class balance especially when dealing with imbalanced datasets. Mathematically, it is given as Equation (9).</p>

<disp-formula id="FD9"><div class="html-disp-formula-info"><div class="f"><math display="inline"><semantics><mrow><mi>F</mi><mn>1</mn><mo>-</mo><mi>s</mi><mi>c</mi><mi>o</mi><mi>r</mi><mi>e</mi><mo>=</mo><mn>2</mn><mo>×</mo><mfrac><mrow><mi>P</mi><mi>r</mi><mi>e</mi><mi>c</mi><mi>i</mi><mi>s</mi><mi>i</mi><mi>o</mi><mi>n</mi><mo>×</mo><mi>R</mi><mi>e</mi><mi>c</mi><mi>a</mi><mi>l</mi><mi>l</mi></mrow><mrow><mi>P</mi><mi>r</mi><mi>e</mi><mi>c</mi><mi>i</mi><mi>s</mi><mi>i</mi><mi>o</mi><mi>n</mi><mo>+</mo><mi>R</mi><mi>e</mi><mi>c</mi><mi>a</mi><mi>l</mi><mi>l</mi></mrow></mfrac></mrow></semantics></math></div><div class="l"><label>(9)</label></div></div></disp-formula><p>The combined effect of these metrics reveals how accurate and effective the model proves to be for target variable predictions.</p>
</sec><sec id="sec4">
<title>Results and Discussion</title><p>A combination of these evaluation metrics helps determine both the accuracy and effectiveness of target prediction by the model. A multithreaded computer system enabled the execution using its Intel Core i7 CPU operating at 3.4 GHz in combination with an NVIDIA Geforce GTX 980M GPU having 8 GB of RAM and additional system components. The evaluation metrics performance of the proposed GRU model can be found inTable <xref ref-type="table" rid="tab2">2</xref>. The model demonstrated 96.65% accuracy, which proves its ability to detect predictions with high precision. The model exhibits precision at 97%, which demonstrates its capacity to detect genuine positives with low false alarm rates, and a recall of 92.5% proves its achievement of identifying most actual SQLi instances. The F1-score level of 94% demonstrates that the GRU model maintains proper precision-recall balance when detecting SQLi attack set variables, thus establishing its reliable and robust nature.</p>
<table-wrap id="tab2">
<label>Table 2</label>
<caption>
<p><b> </b><b>Experiment Results of Proposed Models for Detection of SQL Injection Attacks</b></p>
</caption>

<table>
<thead>
<tr>
<th align="center"><a name="_Hlk181366897">Performance  Matrix</a></th>
<th align="center">Gated Recurrent Unit (GRU) Model</th>
<th align="center"></th>
</tr>
</thead>
<tbody>
<tr>
<td align="center">Accuracy</td>
<td align="center">96.65</td>
<td align="center"></td>
</tr>
<tr>
<td align="center">Precision</td>
<td align="center">97</td>
<td align="center"></td>
</tr>
<tr>
<td align="center">Recall</td>
<td align="center">92.5</td>
<td align="center"></td>
</tr>
<tr>
<td align="center">F1-score</td>
<td align="center">94</td>
<td align="center"></td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<fn>

</fn>
</table-wrap-foot>
</table-wrap><p></p>
<p>Table 2 shows the training accuracy (red dashed line with circles) and validation accuracy (green solid line with circles) over 20 epochs. The training accuracy generally fluctuates between approximately 0.97 and 0.99, showing an overall high performance on the training data. The authentication accuracy, representing the representation's performance on unseen data, varies between roughly 0.96 and 0.98, indicating good generalization with some fluctuations across epochs. Notably, there isn't a significant and consistent disparity between validation accuracy and training outcomes, indicating that the training data is not being overfitted by the model.</p>
<fig id="fig3">
<label>Figure 3</label>
<caption>
<p><b> </b>Loss Curves for the GRU</p>
</caption>
<graphic xlink:href="1333.fig.003" />
</fig><p>Figure 3 shows the training loss (blue dashed line with circles) and validation loss (purple solid line with circles) over 20 epochs. Both training and validation loss generally range roughly between 0.05 and 0.11, suggesting that the model is learning and that the error is becoming less with time. But the loss of validity exhibits more variability and, at times, spikes higher than the training loss, suggesting that when compared to training data, the arrangement of concepts performs less reliably when dealing with uncertain data.</p>
<fig id="fig4">
<label>Figure 4</label>
<caption>
<p><b> </b>Confusion Matrix for the GRU model</p>
</caption>
<graphic xlink:href="1333.fig.004" />
</fig><p>Figure 4 presents the GRU algorithm's confusion matrix. cataloguing presentation, with 2 classes, malicious and benign. The matrix indicates 667 TN and 300 true positives, showing the model accurately identified both benign and malicious cases. Misclassifications were minimal, with only 10 FP and 23 FN, demonstrating the GRU model&#x26;#x02019;s strong classification capability. The model performs slightly better at identifying benign instances but overall shows balanced and effective detection across both classes.</p>
<title>4.1. Comparison with Discussion</title><p>Here, the experimental results are compared between ML and DL models (seeTable <xref ref-type="table" rid="tab3">3</xref>) for detecting SQLi attacks. The GRU model delivered 96.65% accuracy which surpassed all other traditional ML-based models. The SVM scored 91% accuracy with KNN at 87.6%. SQLi attack detection operates more efficiently with GRU models because they successfully capture sophisticated temporal data patterns better than traditional ML solutions.</p>
<p></p>
<table-wrap id="tab3">
<label>Table 3</label>
<caption>
<p><b> </b><b>Comparison between ML and DL models for SQL Injection Attack Detection on SQL Injection Dataset</b></p>
</caption>

<table>
<thead>
<tr>
<th align="center"><a name="_Hlk180749884">Models</a></th>
<th align="center">Accuracy</th>
<th align="center"></th>
</tr>
</thead>
<tbody>
<tr>
<td align="center">Support Vector Machine (SVM) [15]</td>
<td align="center">91</td>
<td align="center"></td>
</tr>
<tr>
<td align="center">K-Nearest Neighbors (KNN) [16]</td>
<td align="center">87.6</td>
<td align="center"></td>
</tr>
<tr>
<td align="center">Proposed GRU</td>
<td align="center">96.65</td>
<td align="center"></td>
</tr>
</tbody>
</table>
</table-wrap><p></p>
<p>The proposed model using GRU technology provides multiple benefits for SQLi detection by understanding sequential SQL query dependencies, which results in better accuracy rates. Traditional ML models differ from the GRU network because it maintains effective processing of inputs with different lengths and learns complete context for better accuracy measurements. The model effectively detects benign from malicious queries through its 96.65% accuracy rate accompanied by 94% F1-score measurement. The model shows excellent generalization to unknown data through its minimal overfitting behavior and steady validation results which makes it a dependable solution for real-time web application security operations.</p>
</sec><sec id="sec5">
<title>Conclusion and Future Study</title><p>Security exploits escalate because of growing Information Technology application usage within distributed environments. The primary goal of SQLi attacks is database theft from back-end server organizations by penetrating their customer database systems. The accuracy of the suggested GRU-based DL framework in detecting SQLi assaults is high, achieving 96.65% with 97% precision, 92.5% recall, and 94% F1-score. When it comes to identifying sequential patterns in SQL queries, the suggested model outperforms SVM (91%), and KNN (87.6%) in conventional machine learning models. One considerable drawback of the model comes from its dependence on fixed labeled data records that cannot capture potential changes or camouflage within SQLi assaults.</p>
<p>The field requires immediate attention on these identified deficiencies. Research efforts should concentrate on acquiring extensive datasets that present integrated SQL and NoSQL attack types. The development of attack-resistant models needs equal importance together with their ability to adapt through diverse attack vector evolution. Deep learning and transfer learning approaches should be studied to automate feature extraction because they would make the process less dependent on domain expertise. Practical deployment needs the integration of ML-based tools into real-time security frameworks with low latency performance and high scalability.</p>
</sec>
  </body>
  <back>
    <ref-list>
      <title>References</title>
      
<ref id="R1">
<label>[1]</label>
<mixed-citation publication-type="other">Z. Su and G. Wassermann, "The essence of command injection attacks in web applications," ACM SIGPLAN Not., 2006, doi: 10.1145/1111320.1111070.
</mixed-citation>
</ref>
<ref id="R2">
<label>[2]</label>
<mixed-citation publication-type="other">J. Minhas, "Blocking of SQL Injection Attacks by Comparing Static and Dynamic Queries," Int. J. Comput. Netw. Inf. Secur., 2012, doi: 10.5815/ijcnis.2013.02.01.
</mixed-citation>
</ref>
<ref id="R3">
<label>[3]</label>
<mixed-citation publication-type="other">C. Bockermann, M. Apel, and M. Meier, "Learning SQL for database intrusion detection using context-sensitive modelling (extended abstract)," in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2009. doi: 10.1007/978-3-642-02918-9_12.
</mixed-citation>
</ref>
<ref id="R4">
<label>[4]</label>
<mixed-citation publication-type="other">Kalla, D., &#x00026; Chandrasekaran, A. (2023). Heart disease prediction using machine learning and deep learning. International Journal of Data Mining &#x00026; Knowledge Management Process (IJDKP), 13(3). Science.
</mixed-citation>
</ref>
<ref id="R5">
<label>[5]</label>
<mixed-citation publication-type="other">E. Shafie and A. Cau, "A framework for the detection and prevention of SQL injection attacks," in 11th European Conference on Information Warfare and Security 2012, ECIW 2012, 2012.
</mixed-citation>
</ref>
<ref id="R6">
<label>[6]</label>
<mixed-citation publication-type="other">M. S. Aliero and I. Ghani, "A component based SQL injection vulnerability detection tool," in 2015 9th Malaysian Software Engineering Conference, MySEC 2015, 2016. doi: 10.1109/MySEC.2015.7475225.
</mixed-citation>
</ref>
<ref id="R7">
<label>[7]</label>
<mixed-citation publication-type="other">M. Y. Kim and D. H. Lee, "Data-mining based SQL injection attack detection using internal query trees," Expert Syst. Appl., 2014, doi: 10.1016/j.eswa.2014.02.041.
</mixed-citation>
</ref>
<ref id="R8">
<label>[8]</label>
<mixed-citation publication-type="other">N. M. Sheykhkanloo, "Employing Neural Networks for the detection of SQL injection attack," in ACM International Conference Proceeding Series, 2014. doi: 10.1145/2659651.2659675.
</mixed-citation>
</ref>
<ref id="R9">
<label>[9]</label>
<mixed-citation publication-type="other">Kuraku, D. S., &#x00026; Kalla, D. (2023). Phishing Website URL's Detection Using NLP and Machine Learning Techniques. Journal on Artificial Intelligence-Tech
</mixed-citation>
</ref>
<ref id="R10">
<label>[10]</label>
<mixed-citation publication-type="other">M. Hasan, Z. Balbahaith, and M. Tarique, "Detection of SQL Injection Attacks: A Machine Learning Approach," in 2019 International Conference on Electrical and Computing Technologies and Applications, ICECTA 2019, 2019. doi: 10.1109/ICECTA48151.2019.8959617.
</mixed-citation>
</ref>
<ref id="R11">
<label>[11]</label>
<mixed-citation publication-type="other">U. Noor, Z. Anwar, A. W. Malik, S. Khan, and S. Saleem, "A machine learning framework for investigating data breaches based on semantic analysis of adversary's attack patterns in threat intelligence repositories," Futur. Gener. Comput. Syst., 2019, doi: 10.1016/j.future.2019.01.022.
</mixed-citation>
</ref>
<ref id="R12">
<label>[12]</label>
<mixed-citation publication-type="other">K. Zhang, "A machine learning based approach to identify SQL injection vulnerabilities," in Proceedings - 2019 34th IEEE/ACM International Conference on Automated Software Engineering, ASE 2019, 2019. doi: 10.1109/ASE.2019.00164.
</mixed-citation>
</ref>
<ref id="R13">
<label>[13]</label>
<mixed-citation publication-type="other">M. R. Ul Islam, M. S. Islam, Z. Ahmed, A. Iqbal, and R. Shahriyar, "Automatic detection of NoSQL injection using supervised learning," in Proceedings - International Computer Software and Applications Conference, 2019. doi: 10.1109/COMPSAC.2019.00113.
</mixed-citation>
</ref>
<ref id="R14">
<label>[14]</label>
<mixed-citation publication-type="other">P. R. McWhirter, K. Kifayat, Q. Shi, and B. Askwith, "SQL Injection Attack classification through the feature extraction of SQL query strings using a Gap-Weighted String Subsequence Kernel," J. Inf. Secur. Appl., 2018, doi: 10.1016/j.jisa.2018.04.001.
</mixed-citation>
</ref>
<ref id="R15">
<label>[15]</label>
<mixed-citation publication-type="other">M. Chattopadhyay, R. Sen, S. Gupta, and others, "A comprehensive review and meta-analysis on applications of machine learning techniques in intrusion detection," Australas. J. Inf. Syst., vol. 22, 2018.
</mixed-citation>
</ref>
<ref id="R16">
<label>[16]</label>
<mixed-citation publication-type="other">Kuraku, S., Kalla, D., Samaah, F., &#x00026; Smith, N. (2023). Cultivating proactive cybersecurity culture among IT professional to combat evolving threats. International Journal of Electrical, Electronics and Computers, 8(6).
</mixed-citation>
</ref>
<ref id="R17">
<label>[17]</label>
<mixed-citation publication-type="other">Y. H. Rajarshi Tarafdar, "Finding Majority for Integer Elements," J. Comput. Sci. Coll., vol. 33, no. 5, pp. 187-191, 2018.
</mixed-citation>
</ref>
<ref id="R18">
<label>[18]</label>
<mixed-citation publication-type="other">K. Kamtuo and C. Soomlek, "Machine learning for SQL injection prevention on server-side scripting," in 20th International Computer Science and Engineering Conference: Smart Ubiquitos Computing and Knowledge, ICSEC 2016, 2017. doi: 10.1109/ICSEC.2016.7859950.
</mixed-citation>
</ref>
<ref id="R19">
<label>[19]</label>
<mixed-citation publication-type="other">S. O. Uwagbole, W. J. Buchanan, and L. Fan, "Applied Machine Learning predictive analytics to SQL Injection Attack detection and prevention," in Proceedings of the IM 2017 - 2017 IFIP/IEEE International Symposium on Integrated Network and Service Management, 2017. doi: 10.23919/INM.2017.7987433.
</mixed-citation>
</ref>
<ref id="R20">
<label>[20]</label>
<mixed-citation publication-type="other">Kuraku, D. S., Kalla, D., Smith, N., &#x00026; Samaah, F. (2023). Safeguarding FinTech: elevating employee cybersecurity awareness in financial sector. International Journal of Applied Information Systems (IJAIS), 12(42).
</mixed-citation>
</ref>
<ref id="R21">
<label>[21]</label>
<mixed-citation publication-type="other">Kalla, D., Smith, N., Samaah, F., &#x00026; Polimetla, K. (2022). Enhancing Early Diagnosis: Machine Learning Applications in Diabetes Prediction. Journal of Artificial Intelligence &#x00026; Cloud Computing. SRC/JAICC-205. DOI: doi. org/10.47363/JAICC/2022 (1), 191, 2-7.
</mixed-citation>
</ref>
    </ref-list>
  </back>
</article>