2013
DOI: 10.5120/11857-7626
|View full text |Cite
|
Sign up to set email alerts
|

SQL Injection Attacks: Technique and Prevention Mechanism

Abstract: In today's era where almost every task is performed through web applications, the need to assure the security of web applications has increased. A survey held in 2010 shows web application vulnerabilities and SQL Injection attack ranked among top five [1]. SQL Injection attack (SQLIA) is performed by those persons who want to access the database and want to steal, change or delete the data which they do not have permission to access [1]. In SQLIA adversary requests through a malicious query which shows some co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 11 publications
(17 reference statements)
0
2
0
Order By: Relevance
“…Mechanism [4] This paper uses the query tokenization to validate the query containing the user input. Also the concept of double authentication of previous paper is implemented.…”
Section: B Sql Injection Attacks: Technique and Preventionmentioning
confidence: 99%
“…Mechanism [4] This paper uses the query tokenization to validate the query containing the user input. Also the concept of double authentication of previous paper is implemented.…”
Section: B Sql Injection Attacks: Technique and Preventionmentioning
confidence: 99%
“…The working section is mainly divided in two parts, training query pattern generation without token and training query pattern generation with token [6].…”
Section: Workingmentioning
confidence: 99%