2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS) 2017
DOI: 10.1109/icsess.2017.8342983
|View full text |Cite
|
Sign up to set email alerts
|

SQL injection attack detection using fingerprints and pattern matching technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(11 citation statements)
references
References 13 publications
0
11
0
Order By: Relevance
“…However, the technique can only prevent Boolean-based SQL injection attack. Similar technique using instruction set randomization was also reported in [13][14][15] Similarly, a technique to prevent SQL injection using ASCII codes was proposed by Srivastava. User's input was first converted to ASCII values before saving them in the database.…”
Section: Related Workmentioning
confidence: 72%
“…However, the technique can only prevent Boolean-based SQL injection attack. Similar technique using instruction set randomization was also reported in [13][14][15] Similarly, a technique to prevent SQL injection using ASCII codes was proposed by Srivastava. User's input was first converted to ASCII values before saving them in the database.…”
Section: Related Workmentioning
confidence: 72%
“…Basic indexing strategies have long been a fundamental component of SQL query optimization. Traditional indexing methods, such as B-tree and hash indexes, provide efficient access paths to data by maintaining sorted structures or direct mappings, respectively (Appiah et al, 2017). These indexes significantly improve query performance by reducing the amount of data that needs to be scanned during query execution.…”
Section: Basic Indexing Strategiesmentioning
confidence: 99%
“…Appiah et al [48] proposed a signature-based detection framework for SQL injection attack. In this proposed framework, pattern matching and the fingerprint method are integrated to differentiate valid SQL queries from malevolent queries.…”
Section: B Database 1) Database Attacksmentioning
confidence: 99%