Results 61 to 70 of about 2,009 (161)
Algorithms and software solutions for SQL injection vulnerability testing in web applications
Software security gains importance day by day and developers try to secure web applications as much as possible to protect confidentiality, integrity and availability that are described in the fundamental security model so-called CIA triad. SQL injection
Arslan Berk +3 more
doaj +1 more source
A Framework for Evaluation of SQL Injection Detection and Prevention Tools
SQLIA is a hacking technique by which the attacker adds Structured Query Language code (SQL statements) through a web application's input fields or hidden parameters to access the resources.
Atefeh Tajpour, Suhaimi I brahim
doaj
SQL-injection vulnerability scanning tool for automatic creation of SQL-injection attacks
AbstractSecuring the web against frequent cyber attacks is a big concern as attackers usually intend to snitch private information, financial information, deface and damages websites to prove their hacking capabilities. This type of vandalism may drive many corporations that conduct their business through the web to suffer financial and reputation ...
Bashah Mat Ali, Abdul +3 more
openaire +2 more sources
Approach to detecting SQL injection behaviors in network environment
SQL injection attack is one of the main threats that many Web applications faced with. The traditional detection method depended on the clients or servers.
Yu-fei ZHAO +3 more
doaj +2 more sources
SQL Injection Detection Based on Lightweight Multi-Head Self-Attention
This paper presents a novel neural network model for the detection of Structured Query Language (SQL) injection attacks for web applications. The model features high detection accuracy, fast inference speed, and low weight size.
Rui-Teng Lo +2 more
doaj +1 more source
Early Detection of SQL Injection Attacks
SQL Injection (SQLI) is a common vulnerability found in web applications. The starting point of SQLI attack is the client-side (browser). If attack inputs can be detected early at the browse side, then it could be thwarted early by not forwarding the malicious inputs to the server-side for further processing.
Shahriar, Hossain +2 more
openaire +1 more source
În lucrarea dată este descris ce este SQL injection, care sunt cele mai des întâlnite metode de spargere a accounutilor folosite de hackers pentru a ataca contul utilizatorului. SQL injection este descries ca fiind o vulnerabilitate de securitate care apare atunci când un atacator reușește să manipuleze o interogare SQL într-un mod neintenționat de ...
Sîrbu, V., Saranciuc, D.I.
openaire +1 more source
A WEB-APPLICATION QUALITY ASSESSMENT MODEL BASED ON SQL-INJECTION VULNERABILITY DETECTION
A way of SQL-injection vulnerability detection based on static code analysis is discussed. A web-application internal quality model based on the results of automated detection of SQL-injection vulnerabilities is given.
D. E. Onoshko, V. V. Bakhtizin
doaj
Penetration Testing pada Kerentanan Keamanan Sistem PELAKAT Menggunakan SQL Injection
Penetration Testing bertujuan untuk mengidentifikasi kerentanan sistem dengan cara mensimulasikan serangan dengan teknik tertentu seperti SQL Injection.
Khairul, Asrul Abdullah, Sucipto Sucipto
doaj +1 more source
SQL injection poses serious threats to web applications and databases by enabling unauthorized access and data leakage. To address this issue, we propose a unique graph network, an innovative topology not explored previously for SQL injection detection ...
Duc-Chinh Nguyen +3 more
doaj +1 more source

