The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2020 IEEE 15th International Conference on Industrial and Information Systems (ICIIS) 2020
DOI: 10.1109/iciis51140.2020.9342703
|View full text |Cite
|
Sign up to set email alerts
|

Identification and Mitigation Tool for Sql Injection Attacks (SQLIA)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
4
0
2

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 5 publications
0
4
0
2
Order By: Relevance
“…No Name (TTCN-3) [102], NodeXP [104], OSV [107], ObjectMap [105], Owfuzz [108], PURITY [117], PenQuest [112], PentestGPT [113], PhpSAFE [114], Pyciuti [118], Pyciuti [118], RAT [119], ROSploit [123], RT-RCT [124], RT-RCT [124], Revealer [120], RiscyROP [121], Robin [122], SOA-Scanner [130], SVED [133], Scan-ner++ [125], SerialDetector [127], ShoVAT [128], ShoVAT [128], Snout [129], Snout [129], Spicy [131], Spicy [131], SuperEye [132], TAMELESS [134], TChecker [135], TORPEDO [136], UE Security Reloaded [137], VAPE-BRIDGE [139], VERA [140], VUDDY [141], VulCNN [143], VulDeePecker [144], VulPecker [147], Vulcan [142], Vulnet [145], Vulnsloit [146], WAPTT [148], WebFuzz [149], WebVIM [150] Resource Development ...…”
Section: Reconnaissancementioning
confidence: 99%
See 1 more Smart Citation
“…No Name (TTCN-3) [102], NodeXP [104], OSV [107], ObjectMap [105], Owfuzz [108], PURITY [117], PenQuest [112], PentestGPT [113], PhpSAFE [114], Pyciuti [118], Pyciuti [118], RAT [119], ROSploit [123], RT-RCT [124], RT-RCT [124], Revealer [120], RiscyROP [121], Robin [122], SOA-Scanner [130], SVED [133], Scan-ner++ [125], SerialDetector [127], ShoVAT [128], ShoVAT [128], Snout [129], Snout [129], Spicy [131], Spicy [131], SuperEye [132], TAMELESS [134], TChecker [135], TORPEDO [136], UE Security Reloaded [137], VAPE-BRIDGE [139], VERA [140], VUDDY [141], VulCNN [143], VulDeePecker [144], VulPecker [147], Vulcan [142], Vulnet [145], Vulnsloit [146], WAPTT [148], WebFuzz [149], WebVIM [150] Resource Development ...…”
Section: Reconnaissancementioning
confidence: 99%
“…Black Widow [58], Chainsaw [62], PhpSAFE [114], TChecker [135], WAPTT [148], WebFuzz [149] Software And Platform Security: Web & Mobile Security: Server Side Vulnerabilities And Mitigations: Injection Vulnerabilities: Cross-Site Scripting (Xss): Reflected Xss Link [86] Software And Platform Security: Web & Mobile Security: Server Side Vulnerabilities And Mitigations: Injection Vulnerabilities: Sql-Injection Chainsaw [62], PhpSAFE [114], TChecker [135], WAPTT [148], WebVIM [150] Software And Platform Security: Web & Mobile Security: Server Side Vulnerabilities And Mitigations: Injection Vulnerabilities: User Uploaded Files FUSE [78] Systems Security: Authentication, Authorisation & Accountability: Authentication: Passwords ADaMs [51], GNPassGAN [80], NeuralNetwork-Cracking [100], NoCrack [103], OMEN [106], PassGAN [109], PassGPT [110], PasswordCrack-ingTraining [111], SemanticGuesser [126] Systems Security: Distributed Systems Security Cairis [60], MAL [91], PenQuest [112] Table B.10: CyBOK classification ACM CCS Tools Hardware: Emerging Technologies: Analysis And Design Of Emerging Devices And Systems: Emerging Architectures AVAIN [55], Diane [70], EBF [71], IoTFuzzer [83], Mirage [94], ROSploit [123], RT-RCT [124], Snout [129] Human-Centered Computing: Human Computer Interaction (Hci): Interactive Systems And Tools TAMELESS [134] Networks: Network Components: Intermediate Nodes: Routers ESRFuzzer…”
Section: Cybok Toolsmentioning
confidence: 99%
“…The main goal of SQLi mitigation is to prevent attackers from successfully injecting malicious SQL commands into an application or system, so that sensitive data is not exposed or corrupted (23). One effective way of mitigation is to install a firewall layer on the website (24). These firewalls play a key role in protecting websites by implementing specific rules aimed at blocking and eliminating potentially malicious traffic (25).…”
Section: Introductionmentioning
confidence: 99%
“…Se o ataque for bem sucedido, usuários não autorizados acessam e manipulam o banco de dados da organização. Esta violação de segurança pode acarretar roubo de informações, perda de consistência e indisponibilidade do servidor [Fang et al 2018, Hanmanthu et al 2015, Rankothge et al 2020.…”
Section: Introductionunclassified
“…Diversas pesquisas propõem identificar e prevenir ataques SQLIA utilizando técnicas de aprendizado de máquina [Rankothge et al 2020]. A literatura comprova que tais algoritmos são eficientes na detecção de SQLIA [Fang et al 2018, Joshi and Geetha 2014, Kim and Lee 2014, Mishra 2019, Tang et al 2020.…”
Section: Introductionunclassified