Results 151 to 160 of about 12,963 (201)

A Learning Platform for SQL Injection

Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019
We present a web application system where users can learn about and practice SQL injection attacks. Our system is designed for students in a university level database or computer security class, and is aimed towards students familiar with SQL but with little experience in web security.
Nada Basit   +3 more
openaire   +1 more source

Review on SQL injection and prevention methods (SQL Injection Attacks)

SSRN Electronic Journal, 2008
Today, the spread of the use of the Internet has led to the growth of explosive web design. Millions of users worldwide perform many of their important and vital activities through these websites and in the world of the Internet. This has turned the world of the Internet into a vast repository of information, information that is often important and ...
openaire   +2 more sources

SQL injection attacks

Advances in Engineering Innovation, 2023
SQL Injection (SQLi) attacks continue to pose significant threats to modern web applications, compromising data integrity and confidentiality. This research delves into the development and evaluation of methodologies designed to detect and mitigate these malicious attacks.
openaire   +1 more source

On Preventing SQL Injection Attacks

2015
In this paper, we propose three new approaches to detect and prevent SQL Injection Attacks (SQLIA), as an alternative to the existing solutions namely: (i) Query Rewriting-based approach, (ii) Encoding-based approach, and (iii) Assertion-based approach. We discuss in detail the benefits and shortcomings of the proposals w.r.t. the literature.
Bharat Kumar Ahuja   +3 more
openaire   +1 more source

SQL injection attacks with the AMPA suite

International Journal of Electronic Security and Digital Forensics, 2013
The suite of tools presented here was developed to exploit the lack of sanitisation found in user inputs that reached a target database and sometimes even the server. The focus for the design of the tools was a BLIND SQL injection, the verbosity of the attack and the possibility to inject a web shell which enabled Meterpreter to open a reverse ...
Simone Cecchini, Diane Gan
openaire   +1 more source

Testing Snort with SQL Injection Attacks

Proceedings of the Ninth International C* Conference on Computer Science & Software Engineering - C3S2E '16, 2016
Currently, information security is a significant challenge in the information era because businesses store critical information in databases. Therefore, databases need to be a secure component of an enterprise. Organizations use Intrusion Detection Systems (IDS) as a security infrastructure component, of which a popular implementation is Snort. In this
Rui Silva   +2 more
openaire   +1 more source

A survey of SQL injection defense mechanisms

2009 International Conference for Internet Technology and Secured Transactions, (ICITST), 2009
SQL Injection Attack (SQLIA) is a prevalent method which makes it possible for the attackers to gain direct access to the database and culminates in extracting sensitive information from the firm's database. In this survey, we have presented and analyzed six different SQL Injection prevention techniques which can be used for securing the data storage ...
Kasra Amirtahmasebi   +2 more
openaire   +1 more source

MAC based solution for SQL injection

Journal of Computer Virology and Hacking Techniques, 2014
With the rapid development of Internet, more and more organizations connect their databases to the Internet for resource sharing. However, due to developers’ lack of knowledge of all possible attacks, web applications become vulnerable to multiple attacks. Thus the network databases could face multiple threats.
Diksha Gautam Kumar   +1 more
openaire   +1 more source

Preventing SQL Injection

2010
We began Part 2 with a discussion in Chapter 2 of keeping your PHP scripts secure by careful validation of user input. We continue that discussion here, focusing on user input that participates in your scripts’ interaction with your databases. Your data is, after all, probably your most treasured resource. Your primary goal in writing scripts to access
Chris Snyder   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy