Proceedings of the 23rd International Conference on Distributed Computing and Networking 2022
DOI: 10.1145/3491003.3493233
|View full text |Cite
|
Sign up to set email alerts
|

Prevention of SQL Injection Attack by Using Black Box Testing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…State-of-the-art research of SQL Injection Solutions Figure 6 demonstrates the distribution of SQL Injection techniques used in reducing web application vulnerabilities. Multifarious researchers [83]- [97] implement a pattern matching algorithm to detect and prevent SQL Injection attacks. All applied dynamic analysis except [91], [98]- [100] whom used static analysis.…”
Section: ) Sql Injectionmentioning
confidence: 99%
See 2 more Smart Citations
“…State-of-the-art research of SQL Injection Solutions Figure 6 demonstrates the distribution of SQL Injection techniques used in reducing web application vulnerabilities. Multifarious researchers [83]- [97] implement a pattern matching algorithm to detect and prevent SQL Injection attacks. All applied dynamic analysis except [91], [98]- [100] whom used static analysis.…”
Section: ) Sql Injectionmentioning
confidence: 99%
“…They check user SQL input and find whether they are SQL injected or not using various approaches viz. scanner [92], [94], [95], [97], regular expression [86], string pattern [88] [100], keyword matching [96], no sanitization [84], sanitizing or blocking [87] [101], access control methods [90], and with the cooperation of intrusion detection systems (IDS) [83] [89]. Figure 7 depicts the distribution of the different pattern matching techniques used in SQLI.…”
Section: ) Sql Injectionmentioning
confidence: 99%
See 1 more Smart Citation