2022
DOI: 10.11591/ijece.v12i5.pp5405-5414
|View full text |Cite
|
Sign up to set email alerts
|

A hybrid framework for detecting structured query language injection attacks in web-based applications

Abstract: <p><span>Almost every web-based application is managed and operated through a number of websites, each of which is vulnerable to cyber-attacks that are mounted across the same networks used by the applications, with much less risk to the attacker than physical attacks. Such web-based attacks make use of a range of modern techniques-such as structured query language injection (SQLi), cross-site scripting, and data tampering-to achieve their aims. Among them, SQLi is the most popular and vulnerable a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 31 publications
0
4
0
Order By: Relevance
“…Although data will not be leaked due to hashing, backup is necessary to prevent data destruction. But, now cyber-attacks like SQL injection can be detected easily [31]. Future research may look into developing such a system, that does not need any database or internet connection to verify the product without negatively affecting cost and required time.…”
Section: Resultsmentioning
confidence: 99%
“…Although data will not be leaked due to hashing, backup is necessary to prevent data destruction. But, now cyber-attacks like SQL injection can be detected easily [31]. Future research may look into developing such a system, that does not need any database or internet connection to verify the product without negatively affecting cost and required time.…”
Section: Resultsmentioning
confidence: 99%
“…They function as interfaces for patients, allowing them to access their health data, manage prescriptions, and interact directly with physicians. These apps encourage a proactive approach to health and help patients become more involved in their treatment, as outlined in [27,28,49]. Using IoT in healthcare, communication between patients and physicians improves significantly.…”
Section: Proposed Approachmentioning
confidence: 99%
“…The system will follow the activity of the respondent to determine compliance with information security regulations. In order to identify structured query language injection (SQLi) assaults launched by insiders, Furhad et al [45] presented a hybrid approach in 2022 that combines a normal blockchain foundation with an SQL query matching technique (SQLMT). In the same year, Nguyen et al [46] proposed three models in order to improve the speed of detecting data breaches in control systems.…”
Section: Figure 2 Overview Of Grey Hole Attack [19]mentioning
confidence: 99%