---
title: HTTP requests containing time-based blind SQL injection patterns
description: Datadog, the leading service for cloud-scale monitoring.
breadcrumbs: >-
  Docs > Datadog Security > OOTB Rules > HTTP requests containing time-based
  blind SQL injection patterns
---

# HTTP requests containing time-based blind SQL injection patterns
Classification:attackTactic:[TA0001-initial-access](https://attack.mitre.org/tactics/TA0001)Technique:[T1190-exploit-public-facing-application](https://attack.mitre.org/techniques/T1190) 
## Goal{% #goal %}

Detect HTTP requests whose parameters include time-delay SQL constructs, including when responses succeed.

## Strategy{% #strategy %}

This rule monitors OCSF HTTP query strings for database-specific delay primitives and groups activity by `@ocsf.src_endpoint.ip`.

## Triage and response{% #triage-and-response %}

- Identify the application and database behind the requests and check logs for slow queries or errors.
- If blind SQL injection is plausible, follow your SQL injection response process.
