Skip to content

Example SQL Injection

Example SQL Injection

You are here:
< All Topics
Table of Contents

We understand the behavior of the “normal” network traffic for at least 3 weeks to create a baseline, this allows for correlation and comparison of any new setups. The ETV looks for changes in connection parameters to detect abnormalities.

As part of the 200+ indicators used, the following are used specifically to identify SQL Injection attacks.