Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2012
DOI: 10.5120/8174-1493
|View full text |Cite
|
Sign up to set email alerts
|

CIDT: Detection of Malicious Code Injection Attacks on Web Application

Abstract: Security is one of the major concerns in communication networks and other online Internet based services, which are becoming pervasive in all kinds of domains like business, government, and society. Network security involves activities that all organizations, enterprises, and institutions undertake to protect the value and usability of their assets and to maintain the integrity and continuity of operations that are performed at their end. Network security exists on all the different layers of an OSI model, App… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(10 citation statements)
references
References 11 publications
0
10
0
Order By: Relevance
“…By crafting incorrect malicious queries in the input parameter, the attacker can cause the database to return an error message that may contain information about the backend database [3]. This is also referred to as error-based injection.…”
Section: Illegal/logically Incorrect Queriesmentioning
confidence: 98%
“…By crafting incorrect malicious queries in the input parameter, the attacker can cause the database to return an error message that may contain information about the backend database [3]. This is also referred to as error-based injection.…”
Section: Illegal/logically Incorrect Queriesmentioning
confidence: 98%
“…Choudhary and Dhore [7] considered code injection attacks to be very fatal to Internet users and proposed a signature-based model to classify HTTP requests as either query-based or scripted and also detects the type of attack on the request if any. The proposed model consists of two main modules called query detector and script detector, which analyze the request independently.…”
Section: Related Workmentioning
confidence: 99%
“…McClure and Krüger [23] pointed that their approach is based on the object oriented programming. Their solution consists of an executable Sqldomgen which is executed against a database [24]. This is referred as a SQL domain object model (SQL).…”
Section: A Set Of Learning-based Approaches Has Been Proposedmentioning
confidence: 99%
“…In this approach every valid SQL statement is constructing using an object data model. Next, they obtain the schema of the database, and then iterate through the tables and columns contained in the schema and output number of files containing a strongly typed instances of the abstract object model [24].…”
Section: A Set Of Learning-based Approaches Has Been Proposedmentioning
confidence: 99%