2017
DOI: 10.4018/ijdcf.2017100106
|View full text |Cite
|
Sign up to set email alerts
|

Exploring Defense of SQL Injection Attack in Penetration Testing

Abstract: SQLIA is adopted to attack websites with and without confidential information.Hackers utilize the compromised website as intermediate proxy to attack others for avoiding being committed of cyber-criminal and also enlarging the scale of Distributed Denial of Service Attack (DDoS). The DDoS is that hackers maliciously turn down a website and make network resources unavailable to web users. It is extremely difficult to effectively detect and prevent SQLIA because hackers adopt various evading SQLIA Intrusion Dete… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 54 publications
0
1
0
Order By: Relevance
“…Frequently used queries can be saved in a stored procedure and can be recalled when requested. Since the location of stored procedure is within the database server, therefore the interaction between the program code and the table containing the data can be avoided [29]. This will improve the security of application program code because it can add another layer of abstraction before interacting with database [19].…”
Section: An Improved Stored Procedures Withmentioning
confidence: 99%
“…Frequently used queries can be saved in a stored procedure and can be recalled when requested. Since the location of stored procedure is within the database server, therefore the interaction between the program code and the table containing the data can be avoided [29]. This will improve the security of application program code because it can add another layer of abstraction before interacting with database [19].…”
Section: An Improved Stored Procedures Withmentioning
confidence: 99%