2013 3rd International Conference on Instrumentation, Communications, Information Technology and Biomedical Engineering (ICICI- 2013
DOI: 10.1109/icici-bme.2013.6698541
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of SQL injection attack in web service (a case study of website in Aceh province)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2015
2015

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 1 publication
0
2
0
Order By: Relevance
“…The sever uses these inputs and get or post based method to build SQL query and retrieve data from the database. SQLi is implemented by manipulating HTTP methods [7]. 1) Get based SQLi: In this method user inputs are sent as URL"s data value as shown in Figure 4.…”
Section: Sqlimentioning
confidence: 99%
See 1 more Smart Citation
“…The sever uses these inputs and get or post based method to build SQL query and retrieve data from the database. SQLi is implemented by manipulating HTTP methods [7]. 1) Get based SQLi: In this method user inputs are sent as URL"s data value as shown in Figure 4.…”
Section: Sqlimentioning
confidence: 99%
“…Over the past few years there has been plenty of research in these fields of web application security, their types and vulnerabilities [ [6], [8]. There are various sub types of SQLi and XSS [7]. In this paper we present an assessment and analysis of User-input based SQLi technique implemented on the web applications of .bd domain.…”
Section: Introductionmentioning
confidence: 99%