Results 11 to 20 of about 980 (175)

AE-Net: Novel Autoencoder-Based Deep Features for SQL Injection Attack Detection

open access: yesIEEE Access, 2023
Structured Query Language (SQL) injection attacks represent a critical threat to database-driven applications and systems, exploiting vulnerabilities in input fields to inject malicious SQL code into database queries.
Nisrean Thalji   +4 more
doaj   +3 more sources

SQL injection attack: Detection, prioritization & prevention

open access: yesJournal of Information Security and Applications
Web applications have become central in the digital landscape, providing users instant access to information and allowing businesses to expand their reach. Injection attacks, such as SQL injection (SQLi), are prominent attacks on web applications, given that most web applications integrate a database system.
Alan Paul   +2 more
openaire   +5 more sources

DETECTION OF SQL INJECTION VULNERABILITY IN CODEIGNITER FRAMEWORK USING STATIC ANALYSIS

open access: yesMultitek Indonesia, 2023
QL Injection attacks are still one type of attack that often occurs in web-based applications. The causes and ways to prevent SQL Injection have been widely explained in various sources.
Muhammad Fahmi Al Azhar, Ruki Harwahyu
doaj   +1 more source

SQL Injection Attack: Quick View

open access: yesMesopotamian Journal of CyberSecurity, 2023
SQL injection is a type of security vulnerability that occurs in database-driven web applications where an attacker injects malicious code into the application to gain unauthorized access to sensitive information. This paper aims to provide a comprehensive and systematic review of the existing methods for preventing and detecting SQL injection attacks.
Vugar Abdullayev, Alok Singh Chauhan
openaire   +1 more source

SQL injection attacks countermeasures assessments

open access: yesIndonesian Journal of Electrical Engineering and Computer Science, 2021
<span>SQL injections attacks have been rated as the most dangerous vulnerability of web-based systems over more than a decade by OWASP top ten. Though different static, runtime and hybrid approaches have been proposed to counter SQL injection attacks, no single approach guarantees flawless prevention/ detection for these attacks.
Mamdouh Alenezi   +2 more
openaire   +2 more sources

Preventing SQL Injection Attacks

open access: yesInternational Journal of Computer Applications, 2012
With the recent rapid increase in web based applications that employ back-end database services, results show that SQL Injection and Remote File Inclusion are the two frequently used exploits rather than using other complicated techniques. With the rise in use of web applications, SQL injection based attacks are gradually increasing and is now one of ...
Vaidhyanathan.G Vaidhyanathan.G   +2 more
openaire   +1 more source

Provably throttling SQLI using an enciphering query and secure matching

open access: yesEgyptian Informatics Journal, 2022
Web applications, which dominate the internet, act as communication media between customers and service providers. Web applications are an internet innovation that provide customer services such as e-banking, e-commerce and e-booking.
Mohammed Abdulridha Hussain   +7 more
doaj   +1 more source

SQLrand: Preventing SQL Injection Attacks [PDF]

open access: yes, 2004
We present a practical protection mechanism against SQL injection attacks. Such attacks target databases that are accessible through a web front-end, and take advantage of flaws in the input validation logic of Web components such as CGI scripts. We apply the concept of instruction-set randomization to SQL, creating instances of the language that are ...
Boyd, Stephen W., Keromytis, Angelos D.
openaire   +2 more sources

Ensemble Machine Learning Approaches for Detection of SQL Injection Attack

open access: yesTehnički Glasnik, 2021
In the current era, SQL Injection Attack is a serious threat to the security of the ongoing cyber world particularly for many web applications that reside over the internet. Many webpages accept the sensitive information (e.g.
Umar Farooq
doaj   +1 more source

Early Detection of SQL Injection Attacks

open access: yesInternational Journal of Network Security & Its Applications, 2013
SQL Injection (SQLI) is a common vulnerability found in web applications. The starting point of SQLI attack is the client-side (browser). If attack inputs can be detected early at the browse side, then it could be thwarted early by not forwarding the malicious inputs to the server-side for further processing.
Shahriar, Hossain   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy