2011
DOI: 10.5120/2558-3511
|View full text |Cite
|
Sign up to set email alerts
|

Safe Guard Anomalies against SQL Injection Attacks

Abstract: For internet, web application exists and for web application syntax, semantics, coding and design exists, and for coding and designing, algorithm exists, and for algorithm, protecting techniques and rules exists, But as the internet technologies advanced, vulnerability also advanced .Various old procedures, algorithm functions, coding and designing syntax and semantics are there, which are vulnerable to attack and if used could be easily traced or hacked by the attacker. Old practices which are vulnerable shou… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 8 publications
0
0
0
Order By: Relevance
“…The letter O stands for oracle, which is a system that replies to questions. A query, mostly utilized in the cryptography community [11], the technique for creating and using AEs has changed and is extensively researched, particularly in the area of image recognition. By the multidimensional library of phenotypic elites, Nguyen et al [41] presented an approach for producing AEs that are completely unidentifiable to human sight (MAP-Elites).…”
Section: Attack At Training System (Ts)mentioning
confidence: 99%
See 1 more Smart Citation
“…The letter O stands for oracle, which is a system that replies to questions. A query, mostly utilized in the cryptography community [11], the technique for creating and using AEs has changed and is extensively researched, particularly in the area of image recognition. By the multidimensional library of phenotypic elites, Nguyen et al [41] presented an approach for producing AEs that are completely unidentifiable to human sight (MAP-Elites).…”
Section: Attack At Training System (Ts)mentioning
confidence: 99%
“…The famous DW market silk road operated using the onion router (ToR), an anonymous stream of E-Business and trade, focused on illegal activities based on digital currency (Cypto-Coin) for transaction and revenue generation, hidden from the outer world or even unnoticed by forensic experts, cyber policing and security agencies. Terrorist organizations use DW-Online Social Network (OSN) (even Facebook has the DW -Onion Platform version) messaging system (like hidden wiki and DuckDuckGo) for managing to fund, terrorist recruitment, propaganda generation, attack operation order declaration, threatening post sharing and tracing government and military operations and so on [11]. For tracing the illicit activities of criminals and terrorists, researchers and security agencies continuous trace OSN for abnormal behavior and post, creating a disturbance and made unauthorized by the government, several models are generated to analyze vulnerable inputs and associated files based on AI and DL techniques [12,13].…”
Section: Introductionmentioning
confidence: 99%