On-the-Property-of-the-Distribution-of-Symbols-in-SQL-Injection-Attack