2009 IEEE International Advance Computing Conference 2009
DOI: 10.1109/iadcc.2009.4809188
|View full text |Cite
|
Sign up to set email alerts
|

Combinatorial Approach for Preventing SQL Injection Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0
1

Year Published

2011
2011
2016
2016

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 33 publications
(17 citation statements)
references
References 11 publications
0
16
0
1
Order By: Relevance
“…5.14 "Combinatorial Approach for Preventing SQL Injection Attacks" [16] This approach uses both static and dynamic approaches to detect a SQL injection. It is a signature based SQL injection detection technique.…”
Section: "A Data-centric Approach To Insider Attack Detection In Datamentioning
confidence: 99%
“…5.14 "Combinatorial Approach for Preventing SQL Injection Attacks" [16] This approach uses both static and dynamic approaches to detect a SQL injection. It is a signature based SQL injection detection technique.…”
Section: "A Data-centric Approach To Insider Attack Detection In Datamentioning
confidence: 99%
“…DoubleGuard [8] is a java based application. In order to avoid object duplication, lots of statistical analysis and structure mapping is required.…”
Section: Canid [6]mentioning
confidence: 99%
“…Since the web service is not integrated with the web application, any modification that should be done to the system should be done in such a way that it should be supported by the web service. [3] R. Ezumalai, G. Aghila, proposed a combinatorial approach for shielding web applications against SQL injection attacks. This combinatorial approach incorporates signature based method, used to address security problems related to input validation and auditing based method which analyze the transactions to find out the malicious access.…”
Section: Literature Surveymentioning
confidence: 99%