2014 International Conference on Computer, Communications, and Control Technology (I4CT) 2014
DOI: 10.1109/i4ct.2014.6914229
|View full text |Cite
|
Sign up to set email alerts
|

Secured web application using combination of Query Tokenization and Adaptive Method in preventing SQL Injection Attacks

Abstract: SQL Injection Attacks (SQLlAs) become a major issue nowadays which open opportunities for unrestricted access to the database that underlie web applications. The purpose of this research is to develop a multi-level prevention techniques in order to cater the SQLIAs. The proposed prevention technique combines Query Tokenization and Adaptive Method that will be implemented on multiple platforms that using asp. net programming language. This technique was tested using 5 test cases to ensure it effectiveness. The … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…The sensitive information is exposed during the authentication process as the communication session between client and the OpenStack controller is using HTTP protocol which is not encrypted [22]. Even though the dashboard may have input filtering feature which may prevent a web based attack such as SQL injection [25], based on the experiment result it does not protect user credential data from eavesdropping. This shows that method use in this paper can effectively detect data leakage which occurs on the cloud platform and its infrastructure.…”
Section: Cloud Dashboard Authentication Experiments Resultsmentioning
confidence: 99%
“…The sensitive information is exposed during the authentication process as the communication session between client and the OpenStack controller is using HTTP protocol which is not encrypted [22]. Even though the dashboard may have input filtering feature which may prevent a web based attack such as SQL injection [25], based on the experiment result it does not protect user credential data from eavesdropping. This shows that method use in this paper can effectively detect data leakage which occurs on the cloud platform and its infrastructure.…”
Section: Cloud Dashboard Authentication Experiments Resultsmentioning
confidence: 99%
“…In any secure system, password privacy is very crucial; this will cause security issue to the cloud platform as it could lead to data breach, privacy issues and session hijacking. Even if the web interface has mechanism to filter input to prevent SQL injection [28], it may not able to address security on cloud API due to eavesdropping if the packet was not encrypted.…”
Section: Discussionmentioning
confidence: 99%
“…(Lee, Low, & Wong, 2002). Most of IDSs focus on monitoring IP and Network layer of Internet protocol and are not effectively detected SQLIA which is executed on Application layer of Internet protocol shown in Figure 2.4 (Othman, Ali, Noh, & Alam, 2014). Besides, SQLIA is difficult to detect and prevent as it has many types, approaches and various evading SQLIA detection and prevention techniques (Joshi & Geetha, 2014).…”
Section: Concepts and Definitionmentioning
confidence: 99%