Results 41 to 50 of about 10,646 (208)
Blocking SQL Injection in Database Stored Procedures [PDF]
This thesis contains a summary of all the work that has been done by us for the B-Tech project in the academic session of 2009-2010. The area chosen for the project was SQL Injection attacks and methods to prevent them, and this thesis goes on to ...
Panchamukhi, S, Sarangi, A
core
Using HTML5 to Prevent Detection of Drive-by-Download Web Malware [PDF]
The web is experiencing an explosive growth in the last years. New technologies are introduced at a very fast-pace with the aim of narrowing the gap between web-based applications and traditional desktop applications.
De Maio, Giancarlo +2 more
core +2 more sources
Identification and Authentication Failures: Foundational Aspects of Strong Detection Mechanisms
A review of recent techniques for detecting Identification and Authentication Failures in online platforms storing sensitive user data. Analyzed methods include biometric, hierarchical, blockchain, IoT‐based, EPICS, and VAP authentication systems. ABSTRACT Online platforms, such as e‐commerce and online apps, have become crucial in daily activities ...
Md. Maruf Hassan +2 more
wiley +1 more source
SIDNet: A SQL Injection Detection Network for Enhancing Cybersecurity
SQL (Structured Query Language) injection is one of the most prevalent and dangerous forms of cyber-attacks, posing significant threats to database management systems and the overall security of web applications.
Debendra Muduli +6 more
doaj +1 more source
Automatic Creation of SQL Injection and Cross-Site Scripting Attacks [PDF]
We present a technique for finding security vulnerabilitiesin Web applications. SQL Injection (SQLI) and cross-sitescripting (XSS) attacks are widespread forms of attackin which the attacker crafts the input to the application toaccess or modify user ...
Ernst, Michael D. +3 more
core +5 more sources
Numerical encoding to Tame SQL injection attacks [PDF]
Recent years have seen an astronomical rise in SQL Injection Attacks (SQLIAs) used to compromise the confidentiality, authentication and integrity of organisations' databases. Intruders becoming smarter in obfuscating web requests to evade detection combined with increasing volumes of web traffic from the Internet of Things (IoT), cloud-hosted and on ...
Solomon Ogbomon Uwagbole +2 more
openaire +1 more source
ABSTRACT As software applications get increasingly connected and complex, cybersecurity becomes more and more important to consider during development and evaluation. Software engineers need to be aware of various security threats and the countermeasures that can be taken to mitigate them.
Raffaela Groner +5 more
wiley +1 more source
This paper proposes SQLi‐ScanEval Framework, a standardized SQLi detection system that integrates vulnerability and penetration testing scanners into a standardized framework. It tested seven prominent SQLi vulnerability scanners including OWASP ZAP, Wapiti, Vega, Acunetix, Invicti, Burp Suite, and Arachni on two prominent vulnerable testing ...
Hajira Bashir +6 more
wiley +1 more source
Research on SQL injection detection technology based on SVM
SQL injection, which has the characteristics of great harm and fast variation, has always ranked the top of the OWASP TOP 10, which has always been a hot spot in the research of web security.
Chen Zhuang, Guo Min, zhou Lin
doaj +1 more source
A SQL Injection Detection Method Based on Adaptive Deep Forest
Injection attack is the first of the top 10 security threats announced by the OWASP. Meanwhile, SQL injection is one of the most important types among the injection attacks.
Qi Li +3 more
doaj +1 more source

