Results 21 to 30 of about 23,094 (187)

SQL Vulnerability Detection System for PHP Program [PDF]

open access: yesJisuanji gongcheng, 2016
Aiming at PHP program,this paper proposes an Structured Query Language(SQL) vulnerability detection method based on the injection analysis technology.This method makes a detailed analysis on the injection in the aspects of data flow and program behavior ...
WANG Yaohui,WANG Dan,FU Lihua
doaj   +1 more source

A Static Detection Method for SQL Injection Vulnerability Based on Program Transformation

open access: yesApplied Sciences, 2023
Static analysis is popular for detecting SQL injection vulnerabilities. However, due to the lack of accurate modeling of object-oriented database extensions, current methods fail to accurately detect SQL injection vulnerabilities in applications that use
Ye Yuan   +5 more
doaj   +1 more source

Implementasi Intrusion Prevention System (IPS) Menggunakan Suricata Untuk Serangan SQL Injection

open access: diamondTechne, 2022
Intrusion Prevention System (IPS) merupakan salah satu tool pengamanan pada jaringan. Pada penelitian ini Suricata sebagai IPS untuk melindungi webserver dari serangan SQL Injection menggunakan SQLMap dengan melihat efektifitas rules dan parameter ...
Faula Tanang Anugrah   +2 more
openalex   +4 more sources

A Systematic Literature Review on SQL Injection Attacks

open access: yesNUML International Journal of Engineering and Computing
With the increasing use of web applications, concerns for data integrity and security have increased manifolds in the current time. The growth in quantity of internet clients and sites has made the web security circumstances progressively extreme ...
Maryam Mehmood, Asad Ijaz
doaj   +1 more source

Research on SQL injection detection technology based on SVM

open access: yesMATEC Web of Conferences, 2018
SQL injection, which has the characteristics of great harm and fast variation, has always ranked the top of the OWASP TOP 10, which has always been a hot spot in the research of web security.
Chen Zhuang, Guo Min, zhou Lin
doaj   +1 more source

Analysis of protection capabilities against SQL Injection attacks

open access: yesJournal of Computer Sciences Institute, 2018
Publication refers to SQL Injection attacks whose are one of the most dangerous in a cyberspace. Based on a literature studies, classification of the SQL Injection attacks was prepared.
Bogdan Krawczyński   +2 more
doaj   +1 more source

Penetration test method using blind SQL injection based on second-order fragment and reassembly

open access: yesTongxin xuebao, 2017
How to get rid of the blindness of current SQL injection penetration test,produce the optimized attack pattern of SQL injection,enhance the effectiveness in the phase of attack generation,and improve the accuracy of vulnerability detection of SQL ...
De-guang LE   +4 more
doaj   +2 more sources

A novel technique to prevent SQL injection and cross-site scripting attacks using Knuth-Morris-Pratt string match algorithm

open access: yesEURASIP Journal on Information Security, 2020
Structured Query Language (SQL) injection and cross-site scripting remain a major threat to data-driven web applications. Instances where hackers obtain unrestricted access to back-end database of web applications so as to steal, edit, and destroy ...
Oluwakemi Christiana Abikoye   +4 more
doaj   +1 more source

Systematic literature review on SQL injection attack [PDF]

open access: yes, 2016
SQL injection attack is a common threat to web applications that utilizes poor input validation to implement attack on a target database. It is becoming a very serious problem in web applications as successful execution leads to loss of integrity and ...
Aminu, Lawal Muhammad   +2 more
core   +1 more source

Sql injection detection using Naïve Bayes classifier: A probabilistic approach for web application security [PDF]

open access: yesITM Web of Conferences
A pervasive security issue in web applications is database injection, enabling attackers to alter SQL queries in order to get unauthorized access to confidential information.
Lu Zhexi
doaj   +1 more source

Home - About - Disclaimer - Privacy