A systematic review of detection and prevention techniques of SQL injection attacks
M Nasereddin, A ALKhamaiseh… - … Security Journal: A …, 2023 - Taylor & Francis
ABSTRACT SQL injection is a type of database-targeted attack for data-driven applications.
It is performed by inserting malicious code in the SQL query to alter and modify its meaning …
It is performed by inserting malicious code in the SQL query to alter and modify its meaning …
Input Validation Vulnerabilities in Web Applications: Systematic Review, Classification, and Analysis of the Current State-of-the-Art
FF Fadlalla, HT Elshoush - IEEE Access, 2023 - ieeexplore.ieee.org
In recent years, huge increase in attacks and data breaches is noticed. Most of the attacks
are performed and focused on the vulnerabilities related to web applications. Hence …
are performed and focused on the vulnerabilities related to web applications. Hence …
Sql injection detection for web applications based on elastic-pooling cnn
An enterprise's data can be one of its most important assets and often critical to the firm's
development and survival. SQL injection attack is ranked first in the top ten risks to network …
development and survival. SQL injection attack is ranked first in the top ten risks to network …
Review of SQL injection: problems and prevention
SQL injection happened in electronic records in database and it is still exist even after two
decades since it first happened. Most of the web-based applications are still vulnerable to …
decades since it first happened. Most of the web-based applications are still vulnerable to …
[PDF][PDF] Penetration testing using Kali linux: SQL injection, XSS, wordpres, and WPA2 attacks
TS Gunawan, MK Lim, M Kartiwi, NA Malik… - Indonesian Journal of …, 2018 - academia.edu
Nowadays, computers, smart phones, smart watches, printers, projectors, washing
machines, fridges, and other mobile devices connected to Internet are exposed to various …
machines, fridges, and other mobile devices connected to Internet are exposed to various …
The Detection of SQL Injection on Blockchain-Based Database
In today's world, the storage of data needs a huge amount of space. Meanwhile, cloud and
distributed environments provide sufficient storage space for the data. One of the …
distributed environments provide sufficient storage space for the data. One of the …
SQL injection vulnerability detection using deep learning: a feature-based approach
SQL injection (SQLi), a well-known exploitation technique, is a serious risk factor for
database-driven web applications that are used to manage the core business functions of …
database-driven web applications that are used to manage the core business functions of …
[PDF][PDF] On the review and setup of security audit using Kali Linux
TS Gunawan, MK Lim, NF Zulkurnain… - Indonesian Journal of …, 2018 - researchgate.net
The massive development of technology especially in computers, mobile devices, and
networking has bring security issue forward as primarily concern. The computers and mobile …
networking has bring security issue forward as primarily concern. The computers and mobile …
Automated Detection of SQL Injection Attack on Blockchain-Based Database
K Sinha, AK Keshari - Handbook of Research on Library Response …, 2021 - igi-global.com
In the era of computing, where the data are stored in a cloud or distributed environment, the
privacy of data is one of the challenging tasks. The attacks like denial of service attacks …
privacy of data is one of the challenging tasks. The attacks like denial of service attacks …
A proactive approach for detecting SQL and XSS injection attacks
BS Lakshmi, D Kovvuri, HNV Bolisetti… - … on Applied Artificial …, 2024 - ieeexplore.ieee.org
As web applications increasingly become integral to everyday life, ensuring their security is
paramount. The importance of his cannot be overstated, as web attacks have seen a …
paramount. The importance of his cannot be overstated, as web attacks have seen a …