2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE) 2014
DOI: 10.1109/iscaie.2014.7010210
|View full text |Cite
|
Sign up to set email alerts
|

Detection model for SQL injection attack: An approach for preventing a web application from the SQL injection attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 35 publications
(14 citation statements)
references
References 2 publications
0
14
0
Order By: Relevance
“…It is important to understand the seriousness of vulnerable websites or webservers. An attacker may potentially steal sensitive data from the server or disrupt website operations or simply deface pages of the website [4]. It is crucial to realize that protecting the web application with just firewalls is not enough hence we need a periodical detailed VAPT to ensure the system is fool proof.…”
Section: Vulnerability Assessment and Penetration Testingmentioning
confidence: 99%
“…It is important to understand the seriousness of vulnerable websites or webservers. An attacker may potentially steal sensitive data from the server or disrupt website operations or simply deface pages of the website [4]. It is crucial to realize that protecting the web application with just firewalls is not enough hence we need a periodical detailed VAPT to ensure the system is fool proof.…”
Section: Vulnerability Assessment and Penetration Testingmentioning
confidence: 99%
“…The model composed a module which will execute a process by employing the Boyer Moore string matching algorithm to make it more efficient and accurate detection [7]. Another research suggested a model, Escrow for detecting large-scale SQLi in an efficient manner.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Experimental results show that the proposed approach is more accurate in detecting the attacks than existing approaches. Geogiana Buja et al [10] proposed a detection model for detecting and recognizing the web vulnerability which is; SQL Injection based on the defined and identified criteria. In addition, the proposed detection model will be able to generate a report regarding the vulnerability level of the web application.…”
Section: Related Workmentioning
confidence: 99%