2021
DOI: 10.11591/ijeecs.v21.i2.pp1121-1131
|View full text |Cite
|
Sign up to set email alerts
|

SQL injection attacks countermeasures assessments

Abstract: <span>SQL injections attacks have been rated as the most dangerous vulnerability of web-based systems over more than a decade by OWASP top ten. Though different static, runtime and hybrid approaches have been proposed to counter SQL injection attacks, no single approach guarantees flawless prevention/ detection for these attacks. Hundreds of components of open source and commercial software products are reported to be vulnerable for SQL injection to CVE repository every year. In this mapping study, we id… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 10 publications
(10 reference statements)
0
4
0
1
Order By: Relevance
“…Cruise vector is a tangent vector to the circular and that is positioned perpendicular to the attack vector. The tangent hyperplane is calculated as (7),…”
Section: First Level Idsmentioning
confidence: 99%
See 1 more Smart Citation
“…Cruise vector is a tangent vector to the circular and that is positioned perpendicular to the attack vector. The tangent hyperplane is calculated as (7),…”
Section: First Level Idsmentioning
confidence: 99%
“…An ID has two types such as signature-based intrusion detection (SIDS) and anomaly-based intrusion detection (AIDS). SIDS is used to detect known attacks such as structured query language (SQL), which can easily detect because these patterns already exist in system whereas AIDS is used to detect unknown attacks and these attacks are difficult to detect [6], [7]. Firewalls protect against outside cyber attackers by shielding your computer or network from malicious software or unnecessary network traffic.…”
Section: Introductionmentioning
confidence: 99%
“…Serangan injeksi SQL, biasanya terjadi ketika penyerang mengubah, menghapus, membaca, dan menyalin data dari server basis data dan termasuk serangan aplikasi web yang paling merusak [3]. Dalam beberapa tahun terakhir SQL injections telah muncul sebagai salah satu jenis serangan yang paling berbahaya untuk sistem berbasis web dan menduduki peringkat nomor satu di antara sepuluh kerentanan Open Web Application Security Project (OWASP) [2]. SQL tidak hanya berlaku untuk profesional TI atau geek yang memiliki keterampilan pemrograman saja.…”
Section: Pendahuluanunclassified
“…Injection attacks are more common in web applications where attacker supply unwarranted SQL statements which get processed by the target website resulting in exploitation. Machine learning and deep learning based solutions have proven efficient in combating these attacks as rule based Web Application Firewalls (WAFs) show less accuracy [37].…”
Section: Injection Attacksmentioning
confidence: 99%