Results 161 to 170 of about 10,242 (187)
Some of the next articles are maybe not open access.

SQL-Identifier Injection Attacks

2019 IEEE Conference on Communications and Network Security (CNS), 2019
This paper defines a class of SQL-injection attacks that are based on injecting identifiers, such as table and column names, into SQL statements. An automated analysis of GitHub shows that 15.7% of 120,412 posted Java source files contain code vulnerable to SQL-Identifier Injection Attacks (SQL-IDIAs).
Cagri Cetin, Dmitry Goldgof, Jay Ligatti
openaire   +1 more source

SQL Injection Attacks Countermeasures

2012
Due to the huge growth in the need for using Web applications worldwide, there have been huge efforts from programmers to develop and implement new Web applications to be used by companies. Since a number of these applications lack proper security considerations, malicious users will be able to gain unauthorized access to confidential information of ...
Kasra Amirtahmasebi   +1 more
openaire   +1 more source

Review on SQL injection and prevention methods (SQL Injection Attacks)

SSRN Electronic Journal, 2008
Today, the spread of the use of the Internet has led to the growth of explosive web design. Millions of users worldwide perform many of their important and vital activities through these websites and in the world of the Internet. This has turned the world of the Internet into a vast repository of information, information that is often important and ...
openaire   +2 more sources

On Preventing SQL Injection Attacks

2015
In this paper, we propose three new approaches to detect and prevent SQL Injection Attacks (SQLIA), as an alternative to the existing solutions namely: (i) Query Rewriting-based approach, (ii) Encoding-based approach, and (iii) Assertion-based approach. We discuss in detail the benefits and shortcomings of the proposals w.r.t. the literature.
Bharat Kumar Ahuja   +3 more
openaire   +1 more source

Testing Snort with SQL Injection Attacks

Proceedings of the Ninth International C* Conference on Computer Science & Software Engineering - C3S2E '16, 2016
Currently, information security is a significant challenge in the information era because businesses store critical information in databases. Therefore, databases need to be a secure component of an enterprise. Organizations use Intrusion Detection Systems (IDS) as a security infrastructure component, of which a popular implementation is Snort. In this
Rui Silva   +2 more
openaire   +1 more source

SQL injection attacks - a systematic review

International Journal of Information and Computer Security, 2019
In today's era, each and every person is utilising websites and so many different web applications for online administrations, for example: booking of railway tickets, movie ticketing, shopping, communication and so forth. These websites consists sensitive and confidential information.
Kirti Sharma, Shobha Bhatt
openaire   +1 more source

SQL Injection Attack Detection using ResNet

2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT), 2019
SQL Injection being the top web vulnerabilities, is defined as a code injection technique to gain access over sensitive data. According to OWASP — 2017, it is recorded as one of the top ten web vulnerabilities. Detecting these web vulnerabilities will help to protect sensitive, confidential data.
null Sangeeta   +2 more
openaire   +1 more source

A Taxonomy of SQL Injection Attacks

2013 International Conference on Informatics and Creative Multimedia, 2013
Nowadays web applications play an important role in online business including social networks, online services, banking, shopping, classes, email and etc. Ease of use and access to web application make them more popular in offering online services instead of in person services. a simple user just need a computer and an internet connection to access web
Amirmohammad Sadeghian   +2 more
openaire   +1 more source

Multi-level preventing SQL injection attacks

IEEE Conference Anthology, 2013
The principles of SQL injection attacks and the process of implementation are analyzed in the paper. A Solution of multi-level preventing SQL injection attacks from the client, server, database and web application deployment is proposed. It is used in ASPJVET-based science and research MIS. The results show that it can effectively prevent SQL injection
null Yang Bing, null Wang Xin
openaire   +1 more source

A Study on SQL Injection Attacks.

2022
Some web applications have inherent vulnerabilities that allow hackers to get unauthorized access to confidential and private data in an organization. SQL (structured query language) injection attacks remain to be a serious threat to web applications. It is one of the most used mechanisms by cyberattacks to steal or compromise sensitive data stored in ...
openaire   +1 more source

Home - About - Disclaimer - Privacy