Results 161 to 170 of about 10,646 (208)
Some of the next articles are maybe not open access.

On Preventing SQL Injection Attacks

2015
In this paper, we propose three new approaches to detect and prevent SQL Injection Attacks (SQLIA), as an alternative to the existing solutions namely: (i) Query Rewriting-based approach, (ii) Encoding-based approach, and (iii) Assertion-based approach. We discuss in detail the benefits and shortcomings of the proposals w.r.t. the literature.
Bharat Kumar Ahuja   +3 more
openaire   +1 more source

A Taxonomy of SQL Injection Attacks

2013 International Conference on Informatics and Creative Multimedia, 2013
Nowadays web applications play an important role in online business including social networks, online services, banking, shopping, classes, email and etc. Ease of use and access to web application make them more popular in offering online services instead of in person services. a simple user just need a computer and an internet connection to access web
Amirmohammad Sadeghian   +2 more
openaire   +1 more source

A Survey on SQL Injection Attack: Detection and Challenges

2021 International Conference on Information Technology (ICIT), 2021
Web applications are seen to play a vital role in the individual lives and even assist in the economic development of the country. However, many security vulnerabilities have been developed which can attack the web applications. One of the most common security threats which affect the web applications is the Structured Query Language Injection (SQL ...
Zain Marashdeh   +2 more
openaire   +1 more source

A Survey on SQL Injection Attacks, Detection and Prevention

Proceedings of the 2020 12th International Conference on Machine Learning and Computing, 2020
Since the uses of Web in daily life is increasing in past 20 years and becoming trend now, almost every Web application has its own database to store important data. An attacker can get or even modify the data from database through SQL injection vulnerability, so it is one of the most serious problems in Web application security.
Jianwei Hu 0002   +2 more
openaire   +1 more source

Review on SQL injection and prevention methods (SQL Injection Attacks)

SSRN Electronic Journal, 2008
Today, the spread of the use of the Internet has led to the growth of explosive web design. Millions of users worldwide perform many of their important and vital activities through these websites and in the world of the Internet. This has turned the world of the Internet into a vast repository of information, information that is often important and ...
openaire   +2 more sources

A Detection and Prevention Technique on SQL Injection Attacks

2020 IEEE Conference on Computer Applications(ICCA), 2020
With the web advancements are rapidly developing, the greater part of individuals makes their transactions on web, for example, searching through data, banking, shopping, managing, overseeing and controlling dam and business exchanges, etc. Web applications have gotten fit to numerous individuals’ day by day lives activities.
Zar Chi Su Su Hlaing, Myo Khaing
openaire   +1 more source

SQL Injection Attacks Countermeasures

2012
Due to the huge growth in the need for using Web applications worldwide, there have been huge efforts from programmers to develop and implement new Web applications to be used by companies. Since a number of these applications lack proper security considerations, malicious users will be able to gain unauthorized access to confidential information of ...
Kasra Amirtahmasebi   +1 more
openaire   +1 more source

Information-Theoretic Detection of SQL Injection Attacks

2012 IEEE 14th International Symposium on High-Assurance Systems Engineering, 2012
SQL Injection (SQLI) is a wide spread vulnerability commonly found in web-based programs. Exploitations of SQL injection vulnerabilities lead to harmful consequences such as authentication bypassing and leakage of sensitive personal information. Therefore, SQLI needs to be mitigated to protect end users.
Hossain Shahriar, Mohammad Zulkernine
openaire   +1 more source

SQL Injection Attack Detection using ResNet

2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT), 2019
SQL Injection being the top web vulnerabilities, is defined as a code injection technique to gain access over sensitive data. According to OWASP — 2017, it is recorded as one of the top ten web vulnerabilities. Detecting these web vulnerabilities will help to protect sensitive, confidential data.
Sangeeta   +2 more
openaire   +1 more source

Design considerations for a honeypot for SQL injection Attacks

2009 IEEE 34th Conference on Local Computer Networks, 2009
SQL injection attacks continue to be a major problem for web applications. We investigate design considerations for an application layer honeypot to attract and learn about SQL injection attacks. The honeypot responds with indications of vulnerability leading attackers ultimately to disinformation that could be useful to track them.
Thomas M. Chen, John F. Buford
openaire   +1 more source

Home - About - Disclaimer - Privacy