Results 21 to 30 of about 980 (175)

SQLMVED: SQL injection runtime prevention system based on multi-variant execution

open access: yesTongxin xuebao, 2021
The effectiveness of combining SQL statement parsing with randomization to defend against SQL injection attack (SQLIA) was based on the fact that attackers did not know about the current method of randomization adopted by system.Therefore, once attackers
Bolin MA   +3 more
doaj   +2 more sources

Simulating SQL-Injection Cyber-Attacks Using GNS3 [PDF]

open access: yesInternational Journal of Computer Theory and Engineering, 2016
Network Forensics is a subtopic of Digital Forensics\ud wherein research on artificat investigations and intrusions evidence acquisition is addressed. Among many challenges in the field, the problem of losing data artifacts in the state of flux, (i.e., live volatile data), when network devices are suddenly non-operational remains a topic of interest to
Tobin, Patrick   +3 more
openaire   +1 more source

Penetration test method using blind SQL injection based on second-order fragment and reassembly

open access: yesTongxin xuebao, 2017
How to get rid of the blindness of current SQL injection penetration test,produce the optimized attack pattern of SQL injection,enhance the effectiveness in the phase of attack generation,and improve the accuracy of vulnerability detection of SQL ...
De-guang LE   +4 more
doaj   +2 more sources

Using Nlp Techniques To Detect Sql Injection Attack

open access: yesمجلة جامعة دمشق للعلوم الهندسية, 2023
Most of the applications used on the internet are Web-Based Applications, that accept critical information from users and store this information in databases.
زاهر الشامي   +1 more
doaj  

Augmented attack tree modeling of SQL injection attacks [PDF]

open access: yes2010 2nd IEEE International Conference on Information Management and Engineering, 2010
The SQL injection attacks (SQLIAs) vulnerability is extremely widespread and poses a serious security threat to web applications with built-in access to databases. The SQLIA adversary intelligently exploits the SQL statement parsing operation by web servers via specially constructed SQL statements that subtly lead to non-explicit executions or ...
Jie Wang   +3 more
openaire   +1 more source

A novel technique to prevent SQL injection and cross-site scripting attacks using Knuth-Morris-Pratt string match algorithm

open access: yesEURASIP Journal on Information Security, 2020
Structured Query Language (SQL) injection and cross-site scripting remain a major threat to data-driven web applications. Instances where hackers obtain unrestricted access to back-end database of web applications so as to steal, edit, and destroy ...
Oluwakemi Christiana Abikoye   +4 more
doaj   +1 more source

SIDNet: A SQL Injection Detection Network for Enhancing Cybersecurity

open access: yesIEEE Access
SQL (Structured Query Language) injection is one of the most prevalent and dangerous forms of cyber-attacks, posing significant threats to database management systems and the overall security of web applications.
Debendra Muduli   +6 more
doaj   +1 more source

Cloud Based Secure Web Application [PDF]

open access: yesEngineering and Technology Journal, 2015
The types of web attack continue to appear and add their impacts on web application security, SQL injection, and XSS is one type of these attack, that causes extremely high risk for web application through stolen critical information or broken web ...
Saad K. Majeed   +2 more
doaj   +1 more source

Deep-Learning Based Injection Attacks Detection Method for HTTP

open access: yesMathematics, 2022
In the context of the new era of high digitization and informatization, the emergence of the internet and artificial intelligence technologies has profoundly changed people’s lifestyles. The traditional cyber attack detection has become increasingly weak
Chunhui Zhao   +4 more
doaj   +1 more source

Research on SQL injection detection technology based on SVM

open access: yesMATEC Web of Conferences, 2018
SQL injection, which has the characteristics of great harm and fast variation, has always ranked the top of the OWASP TOP 10, which has always been a hot spot in the research of web security.
Chen Zhuang, Guo Min, zhou Lin
doaj   +1 more source

Home - About - Disclaimer - Privacy