Analysis of SQL injection detection techniques

JP Singh - arxiv preprint arxiv:1605.02796, 2016 - arxiv.org
SQL Injection is one of the vulnerabilities in OWASPs Top Ten List for Web Based
Application Exploitation. These types of attacks takes place on Dynamic Web applications as …

Combinatorial methods for dynamic gray‐box SQL injection testing

B Garn, J Zivanovic, M Leithner… - … Testing, Verification and …, 2022 - Wiley Online Library
This work presents an extended and enhanced gray‐box combinatorial security testing
methodology for SQL injection vulnerabilities in web applications. We propose multiple new …

SQL injection vulnerability detection using deep learning: a feature-based approach

MM Hassan, RB Ahmad… - Indonesian Journal of …, 2021 - section.iaesonline.com
SQL injection (SQLi), a well-known exploitation technique, is a serious risk factor for
database-driven web applications that are used to manage the core business functions of …

A Detailed Evaluation of SQL Injection Attacks, Detection and Prevention Techniques

N Joshi, T Sheth, V Shah, J Gupta… - 2022 5th International …, 2022 - ieeexplore.ieee.org
An SQL Injection attack is a database focused attack for programmes that utilise data. It is
accomplished by inserting malicious lines of code into the SQL queryto alter and modify its …

A structured analysis of sql injection runtime mitigation techniques

S Steiner, D Conte de Leon, J Alves-Foss - 2017 - scholarspace.manoa.hawaii.edu
SQL injection attacks (SQLIA) still remain one of the most commonly occurring and exploited
vulnerabilities. A considerable amount of research concerning SQLIA mitigation techniques …

Investigation framework of web applications vulnerabilities, attacks and protection techniques in structured query language injection attacks

NS Ali - International Journal of Wireless and Mobile …, 2018 - inderscienceonline.com
Web security has become a great challenge in recent years. Structured Query Language
Injection Attack (SQLIA) is a prevalent and dominant class of the serious web application …

[PDF][PDF] Técnicas de mitigación para principales vulnerabilidades de seguridad en aplicaciones web

A Zambrano, T Guarda, EVH Valenzuela… - Revista Ibérica de …, 2019 - researchgate.net
La seguridad de la información se ha vuelto un elemento imprescindible y de gran
consideración para las empresas, puesto que ahora los datos de las mismas se encuentran …

A comparative analysis and performance evaluation of web application protection techniques against injection attacks

NS Ali, ASB Shibghatullah, AH Alhilali… - … Journal of Mobile …, 2020 - inderscienceonline.com
Nowadays, most animation activities are based on internet-enabled applications. But, the
majority of web developers have ignored the privacy and security aspects of each …

[BOOK][B] A semantic least privilege and semi-automated approach to preventing cyber attacks on web applications

S Steiner - 2018 - search.proquest.com
Abstract Structured Query Language injection attacks still remain one of the most commonly
occurring and exploited types of web application vulnerabilities. A considerable amount of …

A intelligent risk detection method in online transactions

M Xu, Y Chu - 2017 12th International Conference on …, 2017 - ieeexplore.ieee.org
To address the issue of risk detection in e-commerce platform, this paper presents an
intelligent risk detection method that can detect risk quickly and accurately without …