A systematic review of detection and prevention techniques of SQL injection attacks

M Nasereddin, A ALKhamaiseh… - … Security Journal: A …, 2023 - Taylor & Francis
ABSTRACT SQL injection is a type of database-targeted attack for data-driven applications.
It is performed by inserting malicious code in the SQL query to alter and modify its meaning …

[PDF][PDF] Collaboro: a collaborative (meta) modeling tool

JLC Izquierdo, J Cabot - PeerJ Computer Science, 2016 - peerj.com
Motivation Scientists increasingly rely on intelligent information systems to help them in their
daily tasks, in particular for managing research objects, like publications or datasets. The …

Defending against web application attacks: Approaches, challenges and implications

D Mitropoulos, P Louridas… - … on Dependable and …, 2017 - ieeexplore.ieee.org
Some of the most dangerous web attacks, such as Cross-Site Scripting and sql injection,
exploit vulnerabilities in web applications that may accept and process data of uncertain …

[PDF][PDF] SQL injection attacks countermeasures assessments

M Alenezi, M Nadeem, R Asif - Indonesian Journal of Electrical …, 2021 - researchgate.net
SQL injections attacks have been rated as the most dangerous vulnerability of web-based
systems over more than a decade by OWASP top ten. Though different static, runtime and …

Web application vulnerability assessment and policy direction towards a secure smart government

OM Awoleye, B Ojuloge, MO Ilori - Government Information Quarterly, 2014 - Elsevier
This paper carried out technological analysis of e-government platforms with a view of
assessing possible application flaws that can inhibit smooth running of the available web …

A countermeasure to SQL injection attack for cloud environment

TY Wu, CM Chen, X Sun, S Liu, JCW Lin - Wireless Personal …, 2017 - Springer
Although cloud computing becomes a new computing model, a variety of security threats
have been described. Among these threats, SQL injection attack (SQLIA) has received …

[HTML][HTML] Fatal injection: A survey of modern code injection attack countermeasures

D Mitropoulos, D Spinellis - PeerJ Computer Science, 2017 - peerj.com
With a code injection attack (CIA) an attacker can introduce malicious code into a computer
program or system that fails to properly encode data that comes from an untrusted source. A …

Generation of SQL-injection free secure algorithm to detect and prevent SQL-injection attacks

K Natarajan, S Subramani - Procedia Technology, 2012 - Elsevier
Security and privacy of database-driven web applications are extremely multifaceted against
web intruders. One of the most dangerous cyber attacks is the SQL-injection attack, which …

[PDF][PDF] SQL injection attacks: Detection and prevention techniques

R Alsahafi - Int. J. Sci. Technol. Res, 2019 - researchgate.net
Database driven web application are vulnerable to SQL Injection Attacks which try to access
the sensitive data directly. They work by injecting malicious SQL codes through the web …

A Hot Query Bank approach to improve detection performance against SQL injection attacks

YC Chung, MC Wu, YC Chen, WK Chang - computers & security, 2012 - Elsevier
SQL injection attacks (SQLIAs) exploit web sites by altering backend SQL statements
through manipulating application input. With the growing popularity of web applications …