Results 11 to 20 of about 10,646 (208)

PachyRand: SQL Randomization for the PostgreSQL JDBC Driver [PDF]

open access: yes, 2005
Many websites are driven by web applications that deliver dynamic content stored in SQL databases. Such systems take input directly from the client via HTML forms.
Keromytis, Angelos D.   +1 more
core   +2 more sources

A novel technique to prevent SQL injection and cross-site scripting attacks using Knuth-Morris-Pratt string match algorithm

open access: yesEURASIP Journal on Information Security, 2020
Structured Query Language (SQL) injection and cross-site scripting remain a major threat to data-driven web applications. Instances where hackers obtain unrestricted access to back-end database of web applications so as to steal, edit, and destroy ...
Oluwakemi Christiana Abikoye   +4 more
doaj   +1 more source

Models and scenarios of implementation of threats for internet resources

open access: yesРоссийский технологический журнал, 2020
To facilitate the detection of various vulnerabilities, there are many different tools (scanners) that can help analyze the security of web applications and facilitate the development of their protection.
S. A. Lesko
doaj   +1 more source

Analysis of protection capabilities against SQL Injection attacks

open access: yesJournal of Computer Sciences Institute, 2018
Publication refers to SQL Injection attacks whose are one of the most dangerous in a cyberspace. Based on a literature studies, classification of the SQL Injection attacks was prepared.
Bogdan Krawczyński   +2 more
doaj   +1 more source

Enhancing the Performance of SQL Injection Attack Detection through Probabilistic Neural Networks

open access: yesApplied Sciences, 2023
SQL injection attack is considered one of the most dangerous vulnerabilities exploited to leak sensitive information, gain unauthorized access, and cause financial loss to individuals and organizations.
Fawaz Khaled Alarfaj, Nayeem Ahmad Khan
doaj   +1 more source

Provably throttling SQLI using an enciphering query and secure matching

open access: yesEgyptian Informatics Journal, 2022
Web applications, which dominate the internet, act as communication media between customers and service providers. Web applications are an internet innovation that provide customer services such as e-banking, e-commerce and e-booking.
Mohammed Abdulridha Hussain   +7 more
doaj   +1 more source

SQL Injection attack roadmap and fusion [PDF]

open access: yes, 2016
With SQL Injection, an attacker can change the intended effect of dynamically generated query in a web Application. This can lead to unauthorized access to the database underlying web application, and harmful transactions on the potentially sensitive ...
Abdullah @ Selimun, Mohd Taufik   +4 more
core   +1 more source

SQLrand: Preventing SQL Injection Attacks [PDF]

open access: yes, 2004
We present a practical protection mechanism against SQL injection attacks. Such attacks target databases that are accessible through a web front-end, and take advantage of flaws in the input validation logic of Web components such as CGI scripts. We apply the concept of instruction-set randomization to SQL, creating instances of the language that are ...
Boyd, Stephen W., Keromytis, Angelos D.
openaire   +2 more sources

Implementasi Web Application Firewall Dalam Mencegah Serangan SQL Injection Pada Website

open access: yesDigital Zone: Jurnal Teknologi Informasi dan Komunikasi, 2020
Dalam beberapa tahun terakhir perkembangan teknologi informasi menjadi semakin pesat, perkembangan ini membuat segala aktifitas dan pekerjaan menjadi lebih mudah, seperti halnya untuk mengakses berita maupun informasi.
Bangkit Wiguna   +2 more
doaj   +1 more source

A Survey on SQL Injection Attacks Types & their Prevention Techniques

open access: yesJISR on Computing, 2023
In the world of connectedness even more than ever before we are using digital technologies in daily life from bank transactions to social networking.
Jibran Rasheed Khan   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy