17 datasets found
  1. Data from: SQL Injection Attack Netflow

    • zenodo.org
    • portalcientifico.unileon.es
    • +2more
    Updated Sep 28, 2022
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Ignacio Crespo; Ignacio Crespo; Adrián Campazas; Adrián Campazas (2022). SQL Injection Attack Netflow [Dataset]. http://doi.org/10.5281/zenodo.6907252
    Explore at:
    Dataset updated
    Sep 28, 2022
    Dataset provided by
    Zenodohttp://zenodo.org/
    Authors
    Ignacio Crespo; Ignacio Crespo; Adrián Campazas; Adrián Campazas
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Introduction

    This datasets have SQL injection attacks (SLQIA) as malicious Netflow data. The attacks carried out are SQL injection for Union Query and Blind SQL injection. To perform the attacks, the SQLMAP tool has been used.

    NetFlow traffic has generated using DOROTHEA (DOcker-based fRamework fOr gaTHering nEtflow trAffic). NetFlow is a network protocol developed by Cisco for the collection and monitoring of network traffic flow data generated. A flow is defined as a unidirectional sequence of packets with some common properties that pass through a network device.

    Datasets

    The firts dataset was colleted to train the detection models (D1) and other collected using different attacks than those used in training to test the models and ensure their generalization (D2).

    The datasets contain both benign and malicious traffic. All collected datasets are balanced.

    The version of NetFlow used to build the datasets is 5.

    DatasetAimSamplesBenign-malicious
    traffic ratio
    D1Training400,00350%
    D2Test57,23950%

    Infrastructure and implementation

    Two sets of flow data were collected with DOROTHEA. DOROTHEA is a Docker-based framework for NetFlow data collection. It allows you to build interconnected virtual networks to generate and collect flow data using the NetFlow protocol. In DOROTHEA, network traffic packets are sent to a NetFlow generator that has a sensor ipt_netflow installed. The sensor consists of a module for the Linux kernel using Iptables, which processes the packets and converts them to NetFlow flows.

    DOROTHEA is configured to use Netflow V5 and export the flow after it is inactive for 15 seconds or after the flow is active for 1800 seconds (30 minutes)

    Benign traffic generation nodes simulate network traffic generated by real users, performing tasks such as searching in web browsers, sending emails, or establishing Secure Shell (SSH) connections. Such tasks run as Python scripts. Users may customize them or even incorporate their own. The network traffic is managed by a gateway that performs two main tasks. On the one hand, it routes packets to the Internet. On the other hand, it sends it to a NetFlow data generation node (this process is carried out similarly to packets received from the Internet).

    The malicious traffic collected (SQLI attacks) was performed using SQLMAP. SQLMAP is a penetration tool used to automate the process of detecting and exploiting SQL injection vulnerabilities.

    The attacks were executed on 16 nodes and launch SQLMAP with the parameters of the following table.

    ParametersDescription
    '--banner','--current-user','--current-db','--hostname','--is-dba','--users','--passwords','--privileges','--roles','--dbs','--tables','--columns','--schema','--count','--dump','--comments', --schema'Enumerate users, password hashes, privileges, roles, databases, tables and columns
    --level=5Increase the probability of a false positive identification
    --risk=3Increase the probability of extracting data
    --random-agentSelect the User-Agent randomly
    --batchNever ask for user input, use the default behavior
    --answers="follow=Y"Predefined answers to yes

    Every node executed SQLIA on 200 victim nodes. The victim nodes had deployed a web form vulnerable to Union-type injection attacks, which was connected to the MYSQL or SQLServer database engines (50% of the victim nodes deployed MySQL and the other 50% deployed SQLServer).

    The web service was accessible from ports 443 and 80, which are the ports typically used to deploy web services. The IP address space was 182.168.1.1/24 for the benign and malicious traffic-generating nodes. For victim nodes, the address space was 126.52.30.0/24.
    The malicious traffic in the test sets was collected under different conditions. For D1, SQLIA was performed using Union attacks on the MySQL and SQLServer databases.

    However, for D2, BlindSQL SQLIAs were performed against the web form connected to a PostgreSQL database. The IP address spaces of the networks were also different from those of D1. In D2, the IP address space was 152.148.48.1/24 for benign and malicious traffic generating nodes and 140.30.20.1/24 for victim nodes.

    To run the MySQL server we ran MariaDB version 10.4.12.
    Microsoft SQL Server 2017 Express and PostgreSQL version 13 were used.

  2. Global web application critical vulnerability taxonomy 2023

    • statista.com
    Updated Jun 26, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Global web application critical vulnerability taxonomy 2023 [Dataset]. https://www.statista.com/statistics/806081/worldwide-application-vulnerability-taxonomy/
    Explore at:
    Dataset updated
    Jun 26, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    2023
    Area covered
    World
    Description

    SQL Injection is the main source of web application critical vulnerabilities found globally in 2023, with ** percent, in addition to ** percent of internet facing critical vulnerabilities due to cross site scripting (stored) attacks.

  3. W

    WAF Firewall Market Report

    • marketreportanalytics.com
    doc, pdf, ppt
    Updated Apr 26, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Market Report Analytics (2025). WAF Firewall Market Report [Dataset]. https://www.marketreportanalytics.com/reports/waf-firewall-market-87674
    Explore at:
    ppt, pdf, docAvailable download formats
    Dataset updated
    Apr 26, 2025
    Dataset authored and provided by
    Market Report Analytics
    License

    https://www.marketreportanalytics.com/privacy-policyhttps://www.marketreportanalytics.com/privacy-policy

    Time period covered
    2025 - 2033
    Area covered
    Global
    Variables measured
    Market Size
    Description

    The Web Application Firewall (WAF) market, valued at $6.80 billion in 2025, is poised for significant growth between 2025 and 2033. This expansion is driven by the escalating sophistication of cyberattacks targeting web applications and the increasing adoption of cloud-based services. Businesses across all sectors, from e-commerce giants to financial institutions and healthcare providers, are recognizing the critical need for robust security solutions to protect sensitive data and maintain operational integrity. The rising prevalence of DDoS attacks, SQL injection, and cross-site scripting vulnerabilities is fueling demand for advanced WAF functionalities, including AI-powered threat detection and automated response mechanisms. The market is witnessing a shift towards cloud-delivered WAFs, offering scalability, ease of deployment, and cost-effectiveness compared to on-premise solutions. This trend, coupled with the growing adoption of DevOps and Agile methodologies, is further accelerating market growth. Continued innovation in WAF technology is another key driver. Vendors are continuously enhancing their offerings with features like bot management, API protection, and advanced analytics to address emerging threats. The integration of WAFs with other security tools, such as intrusion detection and prevention systems (IDPS), Security Information and Event Management (SIEM) systems, and cloud security posture management (CSPM) solutions, is becoming increasingly prevalent, creating a more comprehensive and effective security ecosystem. Furthermore, stringent government regulations regarding data protection and cybersecurity compliance are compelling organizations to invest in robust WAF solutions, contributing significantly to market expansion. While competition among vendors is intense, the overall market outlook remains positive, predicting substantial growth throughout the forecast period. Specific growth rates will depend on factors such as technological advancements, regulatory changes, and the overall economic climate. However, based on current trends and market dynamics, a continued robust expansion is expected. Recent developments include: April 2023 - Akamai Technologies Inc. announced the partnership with Neosec with an API detection and response platform based on data and behavioral analytics, where Neosec's API security solution will significantly enhance Akamai's insight into the constantly developing API threat landscape, complementing Akamai's market-leading application and API security offering. The combination is intended to help clients protect their APIs by assisting them in discovering all of their APIs, assessing their risk, and responding to vulnerabilities and assaults., April 2023 - Barracuda Networks Inc. released new Application security plans to let clients easily safeguard their websites, applications, and APIs with complete enterprise-grade security. The new plans combine ML-powered web application, API, DDoS, and bot protection with Zero Trust security to help prevent today's most complex threats where customers require a solution that delivers Web Application and API Protection (WAAP) to applications regardless of where they reside, including on-premises, hybrid, and multi-cloud application deployments. Barracuda's new Application Protection plans are designed to allow clients to select the security features they require, enter the number of apps, and begin.. Key drivers for this market are: Rising Instances of Web Attacks, Such as Cyber Theft, Espionage, Vandalism, and Fraud, Technological Advancement and Increasing Penetration of IoT Across Various End-user Applications. Potential restraints include: Rising Instances of Web Attacks, Such as Cyber Theft, Espionage, Vandalism, and Fraud, Technological Advancement and Increasing Penetration of IoT Across Various End-user Applications. Notable trends are: Cloud-Based to Witness Significant Growth.

  4. D

    Web Application Firewall (WAF) Market Report | Global Forecast From 2025 To...

    • dataintelo.com
    csv, pdf, pptx
    Updated Sep 22, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Dataintelo (2024). Web Application Firewall (WAF) Market Report | Global Forecast From 2025 To 2033 [Dataset]. https://dataintelo.com/report/web-application-firewall-waf-market
    Explore at:
    csv, pdf, pptxAvailable download formats
    Dataset updated
    Sep 22, 2024
    Dataset authored and provided by
    Dataintelo
    License

    https://dataintelo.com/privacy-and-policyhttps://dataintelo.com/privacy-and-policy

    Time period covered
    2024 - 2032
    Area covered
    Global
    Description

    Web Application Firewall (WAF) Market Outlook



    The global Web Application Firewall (WAF) market size was valued at USD 4.5 billion in 2023 and is projected to reach USD 12.3 billion by 2032, growing at a compound annual growth rate (CAGR) of 11.8% during the forecast period. The primary growth factors for the WAF market include the increasing number of sophisticated cyber-attacks, the rising awareness about data privacy and protection, and the growing adoption of cloud-based services by various industries. This market segment continues to attract substantial investments as businesses strive to secure their web applications and protect sensitive information from cyber threats.



    The rapid digital transformation across various industries has significantly increased the adoption of web applications, making them prime targets for cyber-attacks. The growing number of cyber threats, such as SQL injection, cross-site scripting (XSS), and distributed denial-of-service (DDoS) attacks, have underscored the importance of robust security measures. As businesses increasingly rely on web applications for critical operations, the necessity for advanced WAF solutions has become paramount. Additionally, regulatory compliance requirements, such as GDPR, HIPAA, and PCI DSS, mandate organizations to adopt stringent security measures, further driving the demand for WAF solutions.



    Another significant growth factor for the WAF market is the increasing awareness of data privacy and protection among organizations and consumers. In response to high-profile data breaches and growing concerns over data misuse, businesses are prioritizing the implementation of comprehensive security solutions. WAFs play a crucial role in safeguarding sensitive data by filtering and monitoring HTTP traffic between web applications and the internet. This heightened focus on data security is propelling the market forward as organizations seek to enhance their cybersecurity infrastructure.



    The proliferation of cloud computing technologies is also contributing to the growth of the WAF market. As businesses migrate their operations to the cloud to leverage its scalability, flexibility, and cost-effectiveness, the security of cloud-hosted web applications has become a critical concern. Cloud-based WAF solutions offer several advantages, including ease of deployment, scalability, and centralized management, making them an attractive option for organizations of all sizes. The growing adoption of cloud-based services across various industry verticals is expected to drive the demand for cloud-based WAF solutions in the coming years.



    Regionally, North America dominates the WAF market due to its advanced technological infrastructure, the presence of key market players, and stringent regulatory frameworks. However, significant growth is anticipated in the Asia Pacific region, driven by the increasing digitalization efforts, rising cyber threats, and growing awareness about cybersecurity. European countries are also expected to witness substantial growth, supported by stringent data protection regulations and increasing investments in cybersecurity initiatives.



    Component Analysis



    The Web Application Firewall (WAF) market is segmented by component into solutions and services. The solutions segment encompasses various types of WAF solutions, including hardware-based, software-based, and cloud-based WAFs. Hardware-based WAFs are physical devices deployed on-premises, offering robust security features and high performance. However, they require significant upfront investment and maintenance costs. Software-based WAFs, on the other hand, are more flexible and can be easily integrated with existing IT infrastructure. They offer cost-effective solutions with the ability to provide real-time threat detection and mitigation.



    Cloud-based WAF solutions have gained significant traction in recent years due to their scalability, ease of deployment, and lower total cost of ownership. These solutions are hosted in the cloud and can be quickly deployed across multiple web applications without the need for additional hardware. Cloud-based WAFs leverage a distributed architecture to provide comprehensive protection against various cyber threats, including DDoS attacks, SQL injections, and XSS attacks. The growing adoption of cloud computing and increasing number of web applications are expected to drive the demand for cloud-based WAF solutions during the forecast period.



    The services segment of the WAF market includes professional services and managed services. Professional services encompass consulting,

  5. f

    Number of features selected.

    • plos.figshare.com
    xls
    Updated Jul 21, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Islam Zada; Esraa Omran; Salman Jan; Hessa Alfraihi; Seetah Alsalamah; Abdullah Alshahrani; Shaukat Hayat; Nguyen Phi (2025). Number of features selected. [Dataset]. http://doi.org/10.1371/journal.pone.0328050.t003
    Explore at:
    xlsAvailable download formats
    Dataset updated
    Jul 21, 2025
    Dataset provided by
    PLOS ONE
    Authors
    Islam Zada; Esraa Omran; Salman Jan; Hessa Alfraihi; Seetah Alsalamah; Abdullah Alshahrani; Shaukat Hayat; Nguyen Phi
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    The dynamical growth of cyber threats in IoT setting requires smart and scalable intrusion detection systems. In this paper, a Lean-based hybrid Intrusion Detection framework using Particle Swarm Optimization and Genetic Algorithm (PSO-GA) to select the features and Extreme Learning Machine and Bootstrap Aggregation (ELM-BA) to classify the features is introduced. The proposed framework obtains high detection rates on the CICIDS-2017 dataset, with 100 percent accuracy on important attack categories, like PortScan, SQL Injection, and Brute Force. Statistical verification and visual evaluation metrics are used to validate the model, which can be interpreted and proved to be solid. The framework is crafted following Lean ideals; thus, it has minimal computational overhead and optimal detection efficiency. It can be efficiently ported to the real-world usage in smart cities and industrial internet of things systems. The suggested framework can be deployed in smart cities and industrial Internet of Things (IoT) systems in real time, and it provides scalable and effective cyber threat detection. By adopting it, false positives can be greatly minimized, the latency of the decision-making process can be decreased, as well as the IoT critical infrastructure resilience against the ever-changing cyber threats can be increased.

  6. I

    Global Cloud WAF Market Forecast and Trend Analysis 2025-2032

    • statsndata.org
    excel, pdf
    Updated Aug 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Stats N Data (2025). Global Cloud WAF Market Forecast and Trend Analysis 2025-2032 [Dataset]. https://www.statsndata.org/report/cloud-waf-market-371893
    Explore at:
    excel, pdfAvailable download formats
    Dataset updated
    Aug 2025
    Dataset authored and provided by
    Stats N Data
    License

    https://www.statsndata.org/how-to-orderhttps://www.statsndata.org/how-to-order

    Area covered
    Global
    Description

    The Cloud Web Application Firewall (WAF) market has emerged as a vital segment within the broader cybersecurity landscape, offering essential protection for applications from various online threats such as DDoS attacks, SQL injections, and cross-site scripting. As businesses increasingly migrate their operations to

  7. f

    Raw values for the number of instances and detection accuracy per attack...

    • plos.figshare.com
    csv
    Updated Jul 21, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Islam Zada; Esraa Omran; Salman Jan; Hessa Alfraihi; Seetah Alsalamah; Abdullah Alshahrani; Shaukat Hayat; Nguyen Phi (2025). Raw values for the number of instances and detection accuracy per attack type (related to Table 2). [Dataset]. http://doi.org/10.1371/journal.pone.0328050.s001
    Explore at:
    csvAvailable download formats
    Dataset updated
    Jul 21, 2025
    Dataset provided by
    PLOS ONE
    Authors
    Islam Zada; Esraa Omran; Salman Jan; Hessa Alfraihi; Seetah Alsalamah; Abdullah Alshahrani; Shaukat Hayat; Nguyen Phi
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Raw values for the number of instances and detection accuracy per attack type (related to Table 2).

  8. D

    Vulnerability and Penetration Testing Services Market Report | Global...

    • dataintelo.com
    csv, pdf, pptx
    Updated Sep 2, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Dataintelo (2024). Vulnerability and Penetration Testing Services Market Report | Global Forecast From 2025 To 2033 [Dataset]. https://dataintelo.com/report/global-vulnerability-and-penetration-testing-services-market
    Explore at:
    pptx, csv, pdfAvailable download formats
    Dataset updated
    Sep 2, 2024
    Dataset authored and provided by
    Dataintelo
    License

    https://dataintelo.com/privacy-and-policyhttps://dataintelo.com/privacy-and-policy

    Time period covered
    2024 - 2032
    Area covered
    Global
    Description

    Vulnerability and Penetration Testing Services Market Outlook



    The global vulnerability and penetration testing services market is projected to grow from USD 1.5 billion in 2024 to USD 4.2 billion by 2032, driven by increasing cybersecurity threats and regulatory compliance requirements. A significant factor propelling this growth is the escalating frequency and sophistication of cyber-attacks, which necessitate robust security testing measures across various industries.



    One of the primary growth drivers for the vulnerability and penetration testing services market is the rising awareness of cybersecurity threats among organizations globally. As businesses increasingly adopt digital transformation initiatives, they become more vulnerable to cyber-attacks and data breaches. Consequently, there is a heightened demand for comprehensive security solutions, including vulnerability assessments and penetration testing, to identify and mitigate potential security risks. Additionally, the increasing adoption of Internet of Things (IoT) devices and cloud-based services is creating new attack vectors, further underscoring the need for rigorous security testing.



    Regulatory compliance is another critical factor contributing to the growth of this market. Governments and regulatory bodies worldwide are enacting stringent cybersecurity regulations to protect sensitive data and maintain national security. For instance, regulations such as the General Data Protection Regulation (GDPR) in Europe, the Health Insurance Portability and Accountability Act (HIPAA) in the United States, and similar data protection laws in other regions mandate organizations to implement robust security measures. Penetration testing forms a fundamental component of these compliance frameworks, driving the demand for such services.



    Technological advancements and the increasing sophistication of cybersecurity solutions are also playing a crucial role in market expansion. The development of advanced penetration testing tools and methodologies allows security professionals to simulate real-world attack scenarios accurately and identify vulnerabilities more effectively. Furthermore, the integration of artificial intelligence (AI) and machine learning (ML) technologies in penetration testing solutions is enhancing their capability to detect and respond to emerging threats proactively. These technological innovations are expected to fuel market growth significantly over the forecast period.



    From a regional perspective, North America currently dominates the vulnerability and penetration testing services market, primarily due to the presence of a large number of cybersecurity firms and the high adoption rate of advanced security solutions. The Asia Pacific region is anticipated to witness the highest growth rate, driven by the increasing digitalization of businesses and rising cybersecurity investments in countries such as China, India, and Japan. Europe also represents a significant market, thanks to stringent data protection regulations and the proactive stance of enterprises towards cybersecurity.



    Type Analysis



    The vulnerability and penetration testing services market can be segmented by type into network penetration testing, web application penetration testing, mobile application penetration testing, social engineering, and others. Network penetration testing dominates the market due to the critical need to secure network infrastructure from unauthorized access and attacks. This type of testing involves evaluating network security controls, identifying potential vulnerabilities, and providing recommendations for mitigation. As organizations continue to expand their network footprints, the demand for network penetration testing services is expected to remain robust.



    Web application penetration testing is another significant segment, driven by the proliferation of web applications and the associated security risks. Web applications are often targeted by cybercriminals through techniques such as SQL injection, cross-site scripting (XSS), and other common vulnerabilities. Penetration testing services focused on web applications help organizations identify and address these vulnerabilities, ensuring the security of their online presence. With the increasing reliance on web-based services, this segment is projected to experience substantial growth.



    Mobile application penetration testing is gaining prominence as the use of mobile applications continues to rise. Mobile applications are susceptible to various security threats, including data leakage, insecure data storage, and un

  9. India Antivirus Market Analysis, Size, and Forecast 2025-2029

    • technavio.com
    pdf
    Updated May 22, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Technavio (2025). India Antivirus Market Analysis, Size, and Forecast 2025-2029 [Dataset]. https://www.technavio.com/report/antivirus-market-in-india-industry-analysis
    Explore at:
    pdfAvailable download formats
    Dataset updated
    May 22, 2025
    Dataset provided by
    TechNavio
    Authors
    Technavio
    License

    https://www.technavio.com/content/privacy-noticehttps://www.technavio.com/content/privacy-notice

    Time period covered
    2025 - 2029
    Area covered
    India
    Description

    Snapshot img

    India Antivirus Market Size 2025-2029

    The India antivirus market size is forecast to increase by USD 124.1 million, at a CAGR of 9.6% between 2024 and 2029.

    The market is experiencing significant growth, driven by the increasing use of mobile devices and the adoption of cloud-based antivirus software. With the proliferation of smartphones and tablets, the need to secure these devices against malware and viruses has become paramount. Simultaneously, cloud-based antivirus solutions have gained popularity due to their ability to provide real-time protection and ease of use. Another trend is the advent of cloud-based antivirus software, which offers advantages such as real-time protection and easy deployment. However, the market faces challenges. Complex IT infrastructure in organizations can make antivirus implementation and management a complex process. Regulatory hurdles, such as data privacy laws, also impact adoption. Furthermore, supply chain inconsistencies can lead to challenges in ensuring the availability and reliability of antivirus solutions.
    Companies seeking to capitalize on market opportunities must focus on addressing these challenges by providing user-friendly, cost-effective, and efficient antivirus solutions tailored to the Indian market. Additionally, staying abreast of regulatory requirements and maintaining strong partnerships with IT infrastructure providers can help navigate these challenges effectively. Additionally, the use of artificial intelligence and machine learning technologies in antivirus solutions is a significant trend, enabling better threat detection and response.
    

    What will be the size of the India Antivirus Market during the forecast period?

    Request Free Sample

    In the dynamic Indian antivirus market, cybersecurity threats continue to evolve, necessitating robust solutions for businesses. Phishing attacks and malicious websites pose significant risks, leading companies to invest in cybersecurity insurance and compliance management. Cybersecurity frameworks, such as PCI DSS, provide guidelines for data privacy and security assessments. Ransomware attacks and zero-day threats demand advanced threat detection and malware analysis using heuristic analysis and signature-based detection. Access control, secure development practices, and multi-factor authentication are crucial for preventing unauthorized access. Cloud security, security analytics, and security orchestration are essential for managing and mitigating threats in the digital age. Automated vulnerability scans and spam filters further bolster protection against various threat vectors, including pop-ups and phishing emails.
    Mobile malware and SQL injection attacks targeting businesses necessitate security awareness training and security incident response. Advanced persistent threats, social engineering, and denial-of-service attacks require a proactive approach to risk management. Firewall management, security intelligence, and disaster recovery planning are vital components of a comprehensive cybersecurity strategy. Security automation and managed security services streamline operations, while threat detection and security analytics provide real-time insights. Single sign-on and security incident response ensure business continuity. Wireless security and secure development practices are essential for mitigating risks in today's interconnected world. The market is witnessing significant growth due to several factors. The increasing use of PCs, laptops, smartphones, and social networking sites has led to a wave in cybersecurity threats. 
    

    How is this market segmented?

    The market research report provides comprehensive data (region-wise segment analysis), with forecasts and estimates in 'USD million' for the period 2025-2029, as well as historical data from 2019-2023 for the following segments.

    Product
    
      Laptop
      Desktop
      Mobile/tablet
    
    
    End-user
    
      Enterprise
      Individual
      Government
    
    
    Product Type
    
      Standalone antivirus software
      Integrated security suites
      Cloud-based antivirus
    
    
    Geography
    
      APAC
    
        India
    

    By Product Insights

    The laptop segment is estimated to witness significant growth during the forecast period. The market is witnessing significant growth, driven by the increasing adoption of digital security solutions in various sectors. Large enterprises are prioritizing data loss prevention, security analytics, and vulnerability scanning to safeguard their sensitive information. Real-time protection, security policies, and behavioral analysis are essential components of modern security management. Virus detection and malware protection remain critical in the face of evolving threat landscape, while cloud-based security and disaster recovery are becoming increasingly popular. The education sector is also investing in digital security, focusing on multi-factor authentication and data backup to protect student informat

  10. f

    Labels of normal and attack classes in the CICIDS-2017 dataset.

    • plos.figshare.com
    xls
    Updated Jul 21, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Islam Zada; Esraa Omran; Salman Jan; Hessa Alfraihi; Seetah Alsalamah; Abdullah Alshahrani; Shaukat Hayat; Nguyen Phi (2025). Labels of normal and attack classes in the CICIDS-2017 dataset. [Dataset]. http://doi.org/10.1371/journal.pone.0328050.t001
    Explore at:
    xlsAvailable download formats
    Dataset updated
    Jul 21, 2025
    Dataset provided by
    PLOS ONE
    Authors
    Islam Zada; Esraa Omran; Salman Jan; Hessa Alfraihi; Seetah Alsalamah; Abdullah Alshahrani; Shaukat Hayat; Nguyen Phi
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Labels of normal and attack classes in the CICIDS-2017 dataset.

  11. D

    API Security Testing Tools Market Report | Global Forecast From 2025 To 2033...

    • dataintelo.com
    csv, pdf, pptx
    Updated Sep 23, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Dataintelo (2024). API Security Testing Tools Market Report | Global Forecast From 2025 To 2033 [Dataset]. https://dataintelo.com/report/global-api-security-testing-tools-market
    Explore at:
    pptx, csv, pdfAvailable download formats
    Dataset updated
    Sep 23, 2024
    Dataset authored and provided by
    Dataintelo
    License

    https://dataintelo.com/privacy-and-policyhttps://dataintelo.com/privacy-and-policy

    Time period covered
    2024 - 2032
    Area covered
    Global
    Description

    API Security Testing Tools Market Outlook



    In 2023, the global API Security Testing Tools market size was valued at approximately $850 million. It is projected to grow at a compound annual growth rate (CAGR) of 15% from 2024 to 2032, reaching a market size of around $2.5 billion by the end of the forecast period. One of the primary growth factors driving this market is the increasing incidence of cyber-attacks on APIs, which necessitates robust security measures.



    The growing reliance on APIs in modern software development is a significant factor propelling the market for API security testing tools. APIs are the backbone of many applications, facilitating the integration and interaction between different software systems. As such, they have become a prime target for cybercriminals. The surging adoption of microservices architecture and the widespread use of DevOps practices have further amplified the need for comprehensive API security solutions. Organizations are increasingly recognizing that securing APIs is critical to protecting sensitive data and maintaining trust with customers.



    Additionally, regulatory requirements and compliance standards are driving the demand for API security testing tools. Various regions worldwide have enacted stringent data protection laws that mandate organizations to implement robust security measures, including API security. For example, the General Data Protection Regulation (GDPR) in Europe and the California Consumer Privacy Act (CCPA) in the United States impose heavy penalties for data breaches, encouraging enterprises to invest in advanced security solutions. As a result, there is a growing emphasis on incorporating API security testing into the software development lifecycle to ensure compliance and mitigate risks.



    The increasing complexity of cyber threats is another crucial factor driving the market growth. Cyber-attacks are becoming more sophisticated, with hackers employing advanced techniques to exploit vulnerabilities in APIs. Traditional security measures are often insufficient to counter these evolving threats. Consequently, there is a rising demand for next-generation API security testing tools that offer comprehensive protection against a wide range of attack vectors. These tools provide real-time monitoring, vulnerability assessment, and automated testing capabilities, enabling organizations to proactively identify and remediate security weaknesses.



    From a regional perspective, North America currently holds the largest share of the API security testing tools market, driven by the presence of numerous technology giants and a high level of awareness regarding cybersecurity. However, the Asia Pacific region is expected to witness the highest growth rate during the forecast period. The rapid digitization of economies, increasing adoption of cloud-based services, and the proliferation of mobile applications in countries like China and India are fueling the demand for API security solutions. Additionally, government initiatives to enhance cybersecurity infrastructure are further boosting market growth in this region.



    Type Analysis



    The API security testing tools market can be segmented by type into Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), Interactive Application Security Testing (IAST), and Runtime Application Self-Protection (RASP). Each of these types offers unique benefits and addresses different aspects of API security. Static Application Security Testing (SAST) tools analyze the source code of applications to identify security vulnerabilities early in the development lifecycle. These tools are particularly effective in detecting issues such as hardcoded credentials, insecure coding practices, and code injection vulnerabilities. By integrating SAST tools into the development process, organizations can proactively identify and remediate security flaws before they are exploited by attackers.



    Dynamic Application Security Testing (DAST) tools, on the other hand, focus on identifying vulnerabilities in running applications. These tools simulate real-world attacks to assess the security posture of APIs. DAST tools are highly effective in detecting issues such as cross-site scripting (XSS), SQL injection, and session management flaws. By conducting regular DAST assessments, organizations can gain insights into potential vulnerabilities that may not be apparent during static code analysis. This dynamic approach to security testing helps in identifying and mitigating risks that could compromise the integrity of APIs.



    Interactive Applicatio

  12. f

    ROC curve values, including thresholds, true positive rates (TPR), and false...

    • plos.figshare.com
    csv
    Updated Jul 21, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Islam Zada; Esraa Omran; Salman Jan; Hessa Alfraihi; Seetah Alsalamah; Abdullah Alshahrani; Shaukat Hayat; Nguyen Phi (2025). ROC curve values, including thresholds, true positive rates (TPR), and false positive rates (FPR) used for Fig 7. [Dataset]. http://doi.org/10.1371/journal.pone.0328050.s005
    Explore at:
    csvAvailable download formats
    Dataset updated
    Jul 21, 2025
    Dataset provided by
    PLOS ONE
    Authors
    Islam Zada; Esraa Omran; Salman Jan; Hessa Alfraihi; Seetah Alsalamah; Abdullah Alshahrani; Shaukat Hayat; Nguyen Phi
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    ROC curve values, including thresholds, true positive rates (TPR), and false positive rates (FPR) used for Fig 7.

  13. D

    Cloud Api Security Market Report | Global Forecast From 2025 To 2033

    • dataintelo.com
    csv, pdf, pptx
    Updated Oct 3, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Dataintelo (2024). Cloud Api Security Market Report | Global Forecast From 2025 To 2033 [Dataset]. https://dataintelo.com/report/cloud-api-security-market
    Explore at:
    csv, pptx, pdfAvailable download formats
    Dataset updated
    Oct 3, 2024
    Dataset authored and provided by
    Dataintelo
    License

    https://dataintelo.com/privacy-and-policyhttps://dataintelo.com/privacy-and-policy

    Time period covered
    2024 - 2032
    Area covered
    Global
    Description

    Cloud API Security Market Outlook



    The global market size for Cloud API Security was valued at approximately USD 2 billion in 2023 and is projected to reach around USD 8.3 billion by 2032, exhibiting a compound annual growth rate (CAGR) of 17.1% over the forecast period. The significant growth is primarily driven by the increasing adoption of cloud services and the rising number of cyber threats targeting APIs, which serve as crucial communication links between different software applications.




    One of the primary growth factors for the Cloud API Security market is the rapid digital transformation that businesses across various sectors are undergoing. As companies migrate their operations to cloud environments, the need to secure APIs becomes paramount. APIs are integral to cloud services, facilitating data exchange and enabling the integration of different applications. Consequently, the security of these APIs is critical to maintaining the integrity and confidentiality of data. The increasing complexity of cyber threats, including sophisticated attacks such as API injection and denial of service, further underscores the necessity of robust API security solutions. This growing threat landscape is compelling organizations to invest significantly in Cloud API Security, thereby driving market growth.




    Another significant growth driver is the surge in regulatory requirements pertaining to data security and privacy. Various regulations, such as the General Data Protection Regulation (GDPR) in Europe and the California Consumer Privacy Act (CCPA) in the U.S., mandate stringent security measures to protect consumer data. APIs, being pivotal in data transmission processes, are a focal point of these regulatory requirements. Organizations are increasingly adopting API security solutions to ensure compliance with these regulations and avoid hefty penalties. Additionally, the increasing use of APIs in sectors such as banking, financial services, and healthcare, where data sensitivity is exceptionally high, is also contributing to the heightened demand for API security measures.




    The proliferation of microservices architecture is another crucial factor propelling the Cloud API Security market. Microservices architecture, where applications are broken down into smaller, independently deployable services, relies heavily on APIs for inter-service communication. While this architecture offers numerous benefits, such as increased agility and scalability, it also introduces new security challenges. Each microservice interaction presents a potential attack vector, making comprehensive API security indispensable. As more organizations adopt microservices architecture to enhance their operational efficiency and agility, the demand for advanced API security solutions is expected to escalate.




    Regionally, North America is expected to dominate the Cloud API Security market owing to the presence of a large number of technology-driven enterprises and stringent regulatory requirements related to data privacy. However, the Asia Pacific region is anticipated to witness the fastest growth during the forecast period. The rapid digitalization of businesses in countries like China and India, coupled with increasing investments in cybersecurity infrastructure, is driving the demand for Cloud API Security solutions in the region. Additionally, government initiatives promoting digital economy and smart cities are further contributing to market growth in the Asia Pacific.



    Component Analysis



    The Cloud API Security market can be segmented by component into solutions and services. In the solutions segment, various security solutions such as API gateways, threat protection, and anomaly detection tools are included. API gateways are critical as they manage the API traffic and ensure that only legitimate requests are processed. They serve as the first line of defense against potential threats by monitoring and controlling access to APIs. The growing complexity of API ecosystems and the increasing number of cyber-attacks targeting APIs are driving the demand for more advanced and comprehensive API gateway solutions. Organizations are increasingly seeking solutions that can provide real-time threat intelligence and automated threat mitigation to enhance their security posture.




    In addition to API gateways, threat protection solutions are gaining traction. These solutions are designed to detect and mitigate various types of cyber threats, including SQL injection, cross-site scripting,

  14. f

    Accuracy against each attack (class-wise performance).

    • plos.figshare.com
    xls
    Updated Jul 21, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Islam Zada; Esraa Omran; Salman Jan; Hessa Alfraihi; Seetah Alsalamah; Abdullah Alshahrani; Shaukat Hayat; Nguyen Phi (2025). Accuracy against each attack (class-wise performance). [Dataset]. http://doi.org/10.1371/journal.pone.0328050.t006
    Explore at:
    xlsAvailable download formats
    Dataset updated
    Jul 21, 2025
    Dataset provided by
    PLOS ONE
    Authors
    Islam Zada; Esraa Omran; Salman Jan; Hessa Alfraihi; Seetah Alsalamah; Abdullah Alshahrani; Shaukat Hayat; Nguyen Phi
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Accuracy against each attack (class-wise performance).

  15. f

    Detection accuracy across individual traffic classes (related to Table 6).

    • plos.figshare.com
    csv
    Updated Jul 21, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Islam Zada; Esraa Omran; Salman Jan; Hessa Alfraihi; Seetah Alsalamah; Abdullah Alshahrani; Shaukat Hayat; Nguyen Phi (2025). Detection accuracy across individual traffic classes (related to Table 6). [Dataset]. http://doi.org/10.1371/journal.pone.0328050.s003
    Explore at:
    csvAvailable download formats
    Dataset updated
    Jul 21, 2025
    Dataset provided by
    PLOS ONE
    Authors
    Islam Zada; Esraa Omran; Salman Jan; Hessa Alfraihi; Seetah Alsalamah; Abdullah Alshahrani; Shaukat Hayat; Nguyen Phi
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Detection accuracy across individual traffic classes (related to Table 6).

  16. f

    Comparison with recent studies: Comparison with recent studies.

    • figshare.com
    xls
    Updated Jul 21, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Islam Zada; Esraa Omran; Salman Jan; Hessa Alfraihi; Seetah Alsalamah; Abdullah Alshahrani; Shaukat Hayat; Nguyen Phi (2025). Comparison with recent studies: Comparison with recent studies. [Dataset]. http://doi.org/10.1371/journal.pone.0328050.t007
    Explore at:
    xlsAvailable download formats
    Dataset updated
    Jul 21, 2025
    Dataset provided by
    PLOS ONE
    Authors
    Islam Zada; Esraa Omran; Salman Jan; Hessa Alfraihi; Seetah Alsalamah; Abdullah Alshahrani; Shaukat Hayat; Nguyen Phi
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Comparison with recent studies: Comparison with recent studies.

  17. f

    Comparison of performance metrics with other models.

    • plos.figshare.com
    xls
    Updated Jul 21, 2025
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Islam Zada; Esraa Omran; Salman Jan; Hessa Alfraihi; Seetah Alsalamah; Abdullah Alshahrani; Shaukat Hayat; Nguyen Phi (2025). Comparison of performance metrics with other models. [Dataset]. http://doi.org/10.1371/journal.pone.0328050.t004
    Explore at:
    xlsAvailable download formats
    Dataset updated
    Jul 21, 2025
    Dataset provided by
    PLOS ONE
    Authors
    Islam Zada; Esraa Omran; Salman Jan; Hessa Alfraihi; Seetah Alsalamah; Abdullah Alshahrani; Shaukat Hayat; Nguyen Phi
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Comparison of performance metrics with other models.

  18. Not seeing a result you expected?
    Learn how you can add new datasets to our index.

Share
FacebookFacebook
TwitterTwitter
Email
Click to copy link
Link copied
Close
Cite
Ignacio Crespo; Ignacio Crespo; Adrián Campazas; Adrián Campazas (2022). SQL Injection Attack Netflow [Dataset]. http://doi.org/10.5281/zenodo.6907252
Organization logo

Data from: SQL Injection Attack Netflow

Related Article
Explore at:
2 scholarly articles cite this dataset (View in Google Scholar)
Dataset updated
Sep 28, 2022
Dataset provided by
Zenodohttp://zenodo.org/
Authors
Ignacio Crespo; Ignacio Crespo; Adrián Campazas; Adrián Campazas
License

Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
License information was derived automatically

Description

Introduction

This datasets have SQL injection attacks (SLQIA) as malicious Netflow data. The attacks carried out are SQL injection for Union Query and Blind SQL injection. To perform the attacks, the SQLMAP tool has been used.

NetFlow traffic has generated using DOROTHEA (DOcker-based fRamework fOr gaTHering nEtflow trAffic). NetFlow is a network protocol developed by Cisco for the collection and monitoring of network traffic flow data generated. A flow is defined as a unidirectional sequence of packets with some common properties that pass through a network device.

Datasets

The firts dataset was colleted to train the detection models (D1) and other collected using different attacks than those used in training to test the models and ensure their generalization (D2).

The datasets contain both benign and malicious traffic. All collected datasets are balanced.

The version of NetFlow used to build the datasets is 5.

DatasetAimSamplesBenign-malicious
traffic ratio
D1Training400,00350%
D2Test57,23950%

Infrastructure and implementation

Two sets of flow data were collected with DOROTHEA. DOROTHEA is a Docker-based framework for NetFlow data collection. It allows you to build interconnected virtual networks to generate and collect flow data using the NetFlow protocol. In DOROTHEA, network traffic packets are sent to a NetFlow generator that has a sensor ipt_netflow installed. The sensor consists of a module for the Linux kernel using Iptables, which processes the packets and converts them to NetFlow flows.

DOROTHEA is configured to use Netflow V5 and export the flow after it is inactive for 15 seconds or after the flow is active for 1800 seconds (30 minutes)

Benign traffic generation nodes simulate network traffic generated by real users, performing tasks such as searching in web browsers, sending emails, or establishing Secure Shell (SSH) connections. Such tasks run as Python scripts. Users may customize them or even incorporate their own. The network traffic is managed by a gateway that performs two main tasks. On the one hand, it routes packets to the Internet. On the other hand, it sends it to a NetFlow data generation node (this process is carried out similarly to packets received from the Internet).

The malicious traffic collected (SQLI attacks) was performed using SQLMAP. SQLMAP is a penetration tool used to automate the process of detecting and exploiting SQL injection vulnerabilities.

The attacks were executed on 16 nodes and launch SQLMAP with the parameters of the following table.

ParametersDescription
'--banner','--current-user','--current-db','--hostname','--is-dba','--users','--passwords','--privileges','--roles','--dbs','--tables','--columns','--schema','--count','--dump','--comments', --schema'Enumerate users, password hashes, privileges, roles, databases, tables and columns
--level=5Increase the probability of a false positive identification
--risk=3Increase the probability of extracting data
--random-agentSelect the User-Agent randomly
--batchNever ask for user input, use the default behavior
--answers="follow=Y"Predefined answers to yes

Every node executed SQLIA on 200 victim nodes. The victim nodes had deployed a web form vulnerable to Union-type injection attacks, which was connected to the MYSQL or SQLServer database engines (50% of the victim nodes deployed MySQL and the other 50% deployed SQLServer).

The web service was accessible from ports 443 and 80, which are the ports typically used to deploy web services. The IP address space was 182.168.1.1/24 for the benign and malicious traffic-generating nodes. For victim nodes, the address space was 126.52.30.0/24.
The malicious traffic in the test sets was collected under different conditions. For D1, SQLIA was performed using Union attacks on the MySQL and SQLServer databases.

However, for D2, BlindSQL SQLIAs were performed against the web form connected to a PostgreSQL database. The IP address spaces of the networks were also different from those of D1. In D2, the IP address space was 152.148.48.1/24 for benign and malicious traffic generating nodes and 140.30.20.1/24 for victim nodes.

To run the MySQL server we ran MariaDB version 10.4.12.
Microsoft SQL Server 2017 Express and PostgreSQL version 13 were used.

Search
Clear search
Close search
Google apps
Main menu