2016 International Conference Radio Electronics &Amp; Info Communications (UkrMiCo) 2016
DOI: 10.1109/ukrmico.2016.7739642
|View full text |Cite
|
Sign up to set email alerts
|

SQL injection prevention system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(3 citation statements)
references
References 1 publication
0
3
0
Order By: Relevance
“…Showing the comparison of similar types of attacks with the features and the result is the evaluation proves the algorithm works efficiently to detect the SQLIAs. Voitovych O.P et al [2] proposed a known approach to protect Web applications against SQL injection attacks in the article. To improve the Web software security it is developed defence mechanism that protects Web resources from SQL injection performing.…”
Section: Related Workmentioning
confidence: 99%
“…Showing the comparison of similar types of attacks with the features and the result is the evaluation proves the algorithm works efficiently to detect the SQLIAs. Voitovych O.P et al [2] proposed a known approach to protect Web applications against SQL injection attacks in the article. To improve the Web software security it is developed defence mechanism that protects Web resources from SQL injection performing.…”
Section: Related Workmentioning
confidence: 99%
“…Thus, malicious and normal queries are easily identified. Voitovych, et al (2016) andLiu, et al (2019) approached the problem by developing a software tool that incorporates a server-side language (PHP), formal language theory (regular expressions) and client-side language i.e. JavaScript.…”
Section: Introductionmentioning
confidence: 99%
“…Similar to some evolving structures, it hasalsogained high-interest databases [2] because of the malicious users who wait to exploit their weaknesses and imperfections for their personal goals [3]. The security of databases is important and a developing concern considering the number of occurrences reported constantly [4]. The attack marks at injection focuses contain the examples of Structured Query Language (SQL) tokens and images as SQL-Injection Attacks (SQLIA)-positive while substantial web requests tend to appear as expected information from the application [5].…”
Section: Introductionmentioning
confidence: 99%