2014
DOI: 10.7763/ijet.2014.v6.731
|View full text |Cite
|
Sign up to set email alerts
|

Runtime Monitoring Framework for SQL Injection Attacks

Abstract: Abstract-The increasing use of web applications to provide reliable online services, such as banking, shopping, etc., and to store sensitive user data has made them vulnerable to attacks that target them. In particular, SQL injection, which allows attackers to gain unauthorized access to the database by injecting specially crafted input strings, is one of the most serious threats to web applications. Although researchers and practitioners have proposed various methods to address the SQL injection problem, orga… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
1
1
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 23 publications
0
2
0
Order By: Relevance
“…An author of [81] presents a framework that can be used to handle tautology-based SQLI attacks using the post-deployment monitoring technique. The authors of [87] evaluate runtime monitoring frameworks to detect and prevent SQLI attacks on web applications. The authors of [88] present a cloud computing adoption framework (CCAF) security suitable for business clouds.…”
Section: Developing a Web-based Framework For Sqli Attacks Detection ...mentioning
confidence: 99%
“…An author of [81] presents a framework that can be used to handle tautology-based SQLI attacks using the post-deployment monitoring technique. The authors of [87] evaluate runtime monitoring frameworks to detect and prevent SQLI attacks on web applications. The authors of [88] present a cloud computing adoption framework (CCAF) security suitable for business clouds.…”
Section: Developing a Web-based Framework For Sqli Attacks Detection ...mentioning
confidence: 99%
“…[32] present a framework that can be used to handle tautology-based SQL Injection Attacks using the post-deployment monitoring technique. [38] evaluate Runtime Monitoring Framework to detect and prevent SQL Injection Attacks on web applications. [39] present a cloud computing adoption framework (CCAF) security suitable for business clouds.…”
Section: Developing a Web-based Frameworkmentioning
confidence: 99%