2019
DOI: 10.1080/09720510.2019.1580904
|View full text |Cite
|
Sign up to set email alerts
|

LsSQLIDP : Literature survey on SQL injection detection and prevention techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 4 publications
0
6
0
Order By: Relevance
“…The attack is thought to be a practice run for future attacks aimed at gathering information. This attack takes advantage of the fact that the default error pages on application servers are frequently excessively descriptive [97].…”
Section: Illegal or Incorrect Querymentioning
confidence: 99%
“…The attack is thought to be a practice run for future attacks aimed at gathering information. This attack takes advantage of the fact that the default error pages on application servers are frequently excessively descriptive [97].…”
Section: Illegal or Incorrect Querymentioning
confidence: 99%
“…The attack is thought to be a warm-up for future attacks, gathering information. This attack takes advantage of the fact that application servers' default error pages [46] are frequently excessively descriptive. Due to that the recommended approach is shown in table 4.…”
Section: Piggybacked Querymentioning
confidence: 99%
“…These applications heavily rely on databases that store and transmit the requested data to the users. These databases are often targeted with attacks 6 , the most common being cross-site scripting (XSS) SQL injection 7 . SQLi attacks exploit database security vulnerabilities by injecting malicious code into database queries, granting access to data and allowing modification of it.…”
Section: Introductionmentioning
confidence: 99%
“…SQL Injection can be used for stealing sensitive data such as user IDs or passwords, personal information, and financial information. Different kinds of SQLi Attacks 7 , including: Union-based SQL injection: in this technique, the UNION operator combines the output of multiple SQL statements to access sensitive data. Boolean-based SQL injection: this method uses true or false statements to determine the database schema and gain access to sensitive data.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation