A Novel Approach to Prevent SQL Injection Attack Using URL Filter

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Novel Approach for SQL Injection Prevention Using Hashing & Encryption (SQL-ENCP)

SQL Injection Attack (SQLIA) is a technique that helps the attackers to direct enters into the database in an unauthorized way and reach the highest or most decisive point in extracting or updating sensitive information from any organizations database. In this paper, we studied the scenario of the different types of attacks with descriptions and examples of how attacks of that type could be per...

متن کامل

An Approach for Preventing SQL Injection Attack on Web Application

SQL injection attacks are one of the highest dangers for applications composed for the Web. These attacks are dispatched through uncommonly made client information on web applications that utilization low level string operations to build SQL queries.SQL injection weakness permits an assailant to stream summons straightforwardly to a web application's hidden database and annihilate usefulness or...

متن کامل

An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service

SQL injection is an attack methodology that targets the data residing in a database through the firewall that shields it. The attack takes advantage of poor input validation in code and website administration. SQL Injection Attacks occur when an attacker is able to insert a series of SQL statements in to a ‘query’ by manipulating user input data in to a web-based application, attacker can take ...

متن کامل

SQL Injection Attack Scanner Using Boyer-Moore String Matching Algorithm

In this day and age, the proliferation of fast Internet and advanced technology, have contributed to the development of millions of web applications and the number is going to continue to increase every day. With their various purposes such as business promotions, online shopping, e-learning and social media, it has increased the possibility of privacy violation, information leakage, unauthoriz...

متن کامل

Testing for Tautology based SQL Injection Attack using Runtime Monitors

Today, all commercial and business applications (ecommerce, banking, blogs, web mail, etc.,) are built as webbased database applications. Increasing prominence and usage of these applications has made them more susceptible to attacks because they store huge amount of sensitive user information. Traditional security mechanisms like network firewalls, intrusion detection systems, and use of encry...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Innovation, Management and Technology

سال: 2012

ISSN: 2010-0248

DOI: 10.7763/ijimt.2012.v3.284