Results 61 to 70 of about 2,009 (161)

Algorithms and software solutions for SQL injection vulnerability testing in web applications

open access: yesВісник Національного технічного університету "ХПÌ": Системний аналіз, управління та інформаційні технології, 2018
Software security gains importance day by day and developers try to secure web applications as much as possible to protect confidentiality, integrity and availability that are described in the fundamental security model so-called CIA triad. SQL injection
Arslan Berk   +3 more
doaj   +1 more source

A Framework for Evaluation of SQL Injection Detection and Prevention Tools

open access: yesInternational Journal of Information and Communication Technology Research, 2013
SQLIA is a hacking technique by which the attacker adds Structured Query Language code (SQL statements) through a web application's input fields or hidden parameters to access the resources.
Atefeh Tajpour, Suhaimi I brahim
doaj  

SQL-injection vulnerability scanning tool for automatic creation of SQL-injection attacks

open access: yesProcedia Computer Science, 2011
AbstractSecuring the web against frequent cyber attacks is a big concern as attackers usually intend to snitch private information, financial information, deface and damages websites to prove their hacking capabilities. This type of vandalism may drive many corporations that conduct their business through the web to suffer financial and reputation ...
Bashah Mat Ali, Abdul   +3 more
openaire   +2 more sources

Approach to detecting SQL injection behaviors in network environment

open access: yesTongxin xuebao, 2016
SQL injection attack is one of the main threats that many Web applications faced with. The traditional detection method depended on the clients or servers.
Yu-fei ZHAO   +3 more
doaj   +2 more sources

SQL Injection Detection Based on Lightweight Multi-Head Self-Attention

open access: yesApplied Sciences
This paper presents a novel neural network model for the detection of Structured Query Language (SQL) injection attacks for web applications. The model features high detection accuracy, fast inference speed, and low weight size.
Rui-Teng Lo   +2 more
doaj   +1 more source

Early Detection of SQL Injection Attacks

open access: yesInternational Journal of Network Security & Its Applications, 2013
SQL Injection (SQLI) is a common vulnerability found in web applications. The starting point of SQLI attack is the client-side (browser). If attack inputs can be detected early at the browse side, then it could be thwarted early by not forwarding the malicious inputs to the server-side for further processing.
Shahriar, Hossain   +2 more
openaire   +1 more source

SQL injection

open access: yes
În lucrarea dată este descris ce este SQL injection, care sunt cele mai des întâlnite metode de spargere a accounutilor folosite de hackers pentru a ataca contul utilizatorului. SQL injection este descries ca fiind o vulnerabilitate de securitate care apare atunci când un atacator reușește să manipuleze o interogare SQL într-un mod neintenționat de ...
Sîrbu, V., Saranciuc, D.I.
openaire   +1 more source

A WEB-APPLICATION QUALITY ASSESSMENT MODEL BASED ON SQL-INJECTION VULNERABILITY DETECTION

open access: yesДоклады Белорусского государственного университета информатики и радиоэлектроники, 2019
A way of SQL-injection vulnerability detection based on static code analysis is discussed. A web-application internal quality model based on the results of automated detection of SQL-injection vulnerabilities is given.
D. E. Onoshko, V. V. Bakhtizin
doaj  

Penetration Testing pada Kerentanan Keamanan Sistem PELAKAT Menggunakan SQL Injection

open access: yesJurnal Teknologi dan Sistem Informasi
Penetration Testing bertujuan untuk mengidentifikasi kerentanan sistem dengan cara mensimulasikan serangan dengan teknik tertentu seperti SQL Injection.
Khairul, Asrul Abdullah, Sucipto Sucipto
doaj   +1 more source

Towards lightweight model using non-local-based graph convolution neural network for SQL injection detection

open access: yesEgyptian Informatics Journal
SQL injection poses serious threats to web applications and databases by enabling unauthorized access and data leakage. To address this issue, we propose a unique graph network, an innovative topology not explored previously for SQL injection detection ...
Duc-Chinh Nguyen   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy