2019
DOI: 10.1007/s12652-019-01235-z
|View full text |Cite
|
Sign up to set email alerts
|

An algorithm for detecting SQL injection vulnerability using black-box testing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
34
0
3

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
3

Relationship

2
7

Authors

Journals

citations
Cited by 62 publications
(39 citation statements)
references
References 27 publications
2
34
0
3
Order By: Relevance
“…As it can be observed, in the previous table, the results obtained with the filter proposed in this article, based on the metrics (Precision, Recall and F-measure) are better than those obtained in the references [24 ] and [25] and similar to those obtained in RPAD [26].…”
Section: B Similar Work Comparisonsupporting
confidence: 62%
See 1 more Smart Citation
“…As it can be observed, in the previous table, the results obtained with the filter proposed in this article, based on the metrics (Precision, Recall and F-measure) are better than those obtained in the references [24 ] and [25] and similar to those obtained in RPAD [26].…”
Section: B Similar Work Comparisonsupporting
confidence: 62%
“…Aliero et all in [25] proposes a method with the phases crawling, attacking analysis and reporting to stop SQL injections. It is tested in three web applications.…”
Section: B Similar Work Comparisonmentioning
confidence: 99%
“…Black box testing bukan teknik alternatif daripada white box testing (Larrea, 2017). Lebih daripada itu, merupakan pendekatan pelengkap dalam mencakup error dengan kelas yang berbeda dari metode white box testing (Aliero, Ghani, Qureshi, & Rohani, 2020). Boundary value analysis adalah suatu teknik disain test cases yang berguna untuk melakukan pengujian terhadap nilai sekitar dari pusat domain masukan (Maheshwari, 2017).…”
Section: Metode Penelitianunclassified
“…In addition, many manual and automated testing tools are used for detecting XSS and that also helps in identifying against SQLI vulnerabilities [11,12,13]. However, the burden of high time consumption for the completing the testing a web application for testeris still persists.A lot of work in this direction focused on fuzzing [14], which deals about testing with (semi)-random values.…”
Section: Litrature Reviewmentioning
confidence: 99%