2015 International Conference on Pervasive Computing (ICPC) 2015
DOI: 10.1109/pervasive.2015.7087131
|View full text |Cite
|
Sign up to set email alerts
|

A novel approach for detection of SQL injection and cross site scripting attacks

Abstract: Web applications provide vast category of functionalities and usefulness. As more and more sensitive data is available over the internet hackers are becoming more interested in such data revealing which can cause massive damage. SQL injection is one of such attacks. This attack can be used to infiltrate the database of any web application that may lead to alteration of database or disclosing important information. Cross site scripting is one more attack in which attacker obfuscates the input given to the web a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0
1

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(4 citation statements)
references
References 12 publications
0
3
0
1
Order By: Relevance
“…We use Nmap [15] for scanning open ports. Figure [5] shows the server information and figure [6] shows the resource tree of our target victim website http://testphp.vulnweb.com. Outcomes of phase-2: Outcomes of phase-2: After having, the knowledge base of the website at our disposal, we then find the vulnerabilities of each URI as shown in figure [6] in the second phase.…”
Section: A Results On Http://testphpvulnwebcommentioning
confidence: 99%
See 1 more Smart Citation
“…We use Nmap [15] for scanning open ports. Figure [5] shows the server information and figure [6] shows the resource tree of our target victim website http://testphp.vulnweb.com. Outcomes of phase-2: Outcomes of phase-2: After having, the knowledge base of the website at our disposal, we then find the vulnerabilities of each URI as shown in figure [6] in the second phase.…”
Section: A Results On Http://testphpvulnwebcommentioning
confidence: 99%
“…al. propose an approach for detection of SQL injection and cross site scripting attack [5]. The study in [6] investigate on finding SQL injection and cross site scripting using static analysis tool.…”
Section: Related Workmentioning
confidence: 99%
“…Ada beberapa cara untuk mencegah serangan pada aplikasi web. Seperti yang telah dilakukan oleh peneliti sebelumnya [8], melakukan penelitian untuk mendeteksi serangan SQL Injection dan Cross Site Scripting (XSS) dengan menggunakan metode Intrution Detection System (IDS) [9]. Metode ini berkerja dengan cara memantau lalu lintas jaringan untuk aktivitas yang mencurigakan dan mengeluarkan peringatan saat aktivitas tersebut ditemukan, hasil dari penerapan metode ini peneliti berhasil mendeteksi serangan SQL Injection dan XSS, namun kekurangan dari metode ini hanya bisa mendeteksi serangan saja tetapi tidak bisa memblokir serangan tersebut secara otomatis.…”
Section: Kata Kunci : Web Application Firewall(waf) Vulnerability Sec...unclassified
“…This method can handle any type of query and the algorithm is platform-independent. Other SQL injection detection methods include dynamic query matching technology [18], mapping model from URL to SQL features [19]. For the detection method of secondorder SQL injection, a new set of SQL instructions [20] is constructed dynamically and then detected with a database and proxy server.…”
Section: Figurementioning
confidence: 99%