2020 IEEE Conference on Computer Applications(ICCA) 2020
DOI: 10.1109/icca49400.2020.9022833
|View full text |Cite
|
Sign up to set email alerts
|

A Detection and Prevention Technique on SQL Injection Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 33 publications
(14 citation statements)
references
References 4 publications
0
6
0
Order By: Relevance
“…As Table II indicates, the existing methods did not address the three issues highlighted in one single method; therefore they are not sufficient in securing the database from SQL injection attacks. The method proposed by [4] [12][21] [24] validates the data at the client side and ignore the validation process at the server side. Therefore malicious code might enter the database.…”
Section: An Overview Of the Existing Sql Injection Prevention Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…As Table II indicates, the existing methods did not address the three issues highlighted in one single method; therefore they are not sufficient in securing the database from SQL injection attacks. The method proposed by [4] [12][21] [24] validates the data at the client side and ignore the validation process at the server side. Therefore malicious code might enter the database.…”
Section: An Overview Of the Existing Sql Injection Prevention Methodsmentioning
confidence: 99%
“…For example; students trying to change grades or exam marks. There are also cases which are not personal attacks; such as sabotage the database by deliberately deleting certain tables, shutting down database operations and disrupting network traffic [4]. The term ‗injection' is used because malicious code which considered as a non-valid input is injected into a valid SQL statement.…”
Section: Sql Injection Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…The proposed system is done by using two approaches, which are: creates lexicon and tokenize the input query statement and each string token was detected to predefined words lexicon to prevent SQLIA. Based on the experiment conducted, the proposed system is able to provide a successful prevention from various malicious query for injections [10].…”
Section: Recent Workmentioning
confidence: 99%
“…SQL injection is an assault method with negated SQL articulations used to abuse how site pages speak with backend databases. It can take a shot at defenseless website pages that adventure a backend database like MySQL, Oracle, and MSSQL [15]. The Structured Query Language Injection (SQLI) attack is considered the most dangerous injection category attack because it compromises the main security services: confidentiality, authentication, authorization, and integrity [16].…”
Section: Sql Injectionmentioning
confidence: 99%