A systematic review of detection and prevention techniques of SQL injection attacks
M Nasereddin, A ALKhamaiseh… - … Security Journal: A …, 2023 - Taylor & Francis
ABSTRACT SQL injection is a type of database-targeted attack for data-driven applications.
It is performed by inserting malicious code in the SQL query to alter and modify its meaning …
It is performed by inserting malicious code in the SQL query to alter and modify its meaning …
[PDF][PDF] Collaboro: a collaborative (meta) modeling tool
Motivation Scientists increasingly rely on intelligent information systems to help them in their
daily tasks, in particular for managing research objects, like publications or datasets. The …
daily tasks, in particular for managing research objects, like publications or datasets. The …
Defending against web application attacks: Approaches, challenges and implications
D Mitropoulos, P Louridas… - … on Dependable and …, 2017 - ieeexplore.ieee.org
Some of the most dangerous web attacks, such as Cross-Site Scripting and sql injection,
exploit vulnerabilities in web applications that may accept and process data of uncertain …
exploit vulnerabilities in web applications that may accept and process data of uncertain …
[PDF][PDF] SQL injection attacks countermeasures assessments
SQL injections attacks have been rated as the most dangerous vulnerability of web-based
systems over more than a decade by OWASP top ten. Though different static, runtime and …
systems over more than a decade by OWASP top ten. Though different static, runtime and …
Web application vulnerability assessment and policy direction towards a secure smart government
OM Awoleye, B Ojuloge, MO Ilori - Government Information Quarterly, 2014 - Elsevier
This paper carried out technological analysis of e-government platforms with a view of
assessing possible application flaws that can inhibit smooth running of the available web …
assessing possible application flaws that can inhibit smooth running of the available web …
A countermeasure to SQL injection attack for cloud environment
Although cloud computing becomes a new computing model, a variety of security threats
have been described. Among these threats, SQL injection attack (SQLIA) has received …
have been described. Among these threats, SQL injection attack (SQLIA) has received …
[HTML][HTML] Fatal injection: A survey of modern code injection attack countermeasures
With a code injection attack (CIA) an attacker can introduce malicious code into a computer
program or system that fails to properly encode data that comes from an untrusted source. A …
program or system that fails to properly encode data that comes from an untrusted source. A …
Generation of SQL-injection free secure algorithm to detect and prevent SQL-injection attacks
K Natarajan, S Subramani - Procedia Technology, 2012 - Elsevier
Security and privacy of database-driven web applications are extremely multifaceted against
web intruders. One of the most dangerous cyber attacks is the SQL-injection attack, which …
web intruders. One of the most dangerous cyber attacks is the SQL-injection attack, which …
[PDF][PDF] SQL injection attacks: Detection and prevention techniques
R Alsahafi - Int. J. Sci. Technol. Res, 2019 - researchgate.net
Database driven web application are vulnerable to SQL Injection Attacks which try to access
the sensitive data directly. They work by injecting malicious SQL codes through the web …
the sensitive data directly. They work by injecting malicious SQL codes through the web …
A Hot Query Bank approach to improve detection performance against SQL injection attacks
YC Chung, MC Wu, YC Chen, WK Chang - computers & security, 2012 - Elsevier
SQL injection attacks (SQLIAs) exploit web sites by altering backend SQL statements
through manipulating application input. With the growing popularity of web applications …
through manipulating application input. With the growing popularity of web applications …