SQL injection attacks-a systematic review

K Sharma, S Bhatt - International journal of information and …, 2019 - inderscienceonline.com
In today's era, each and every person is utilising websites and so many different web
applications for online administrations, for example: booking of railway tickets, movie …

[PDF][PDF] A systematic literature review on sql injection attacks techniques and common exploited vulnerabilities

SA Faker, MA Muslim, HS Dachlan - International Journal of …, 2017 - academia.edu
Database faces several threats such as Cross Site Scripting Attack (XSS), phishing, Denial
of Service (DoS) and SQL injection attack. SQL injection attack is the major concern and the …

Sql injection attack detection, evidence collection, and notifying system using standard intrusion detection system in network forensics

S Bhardwaj, M Dave - … on Computational Intelligence, Data Science and …, 2021 - Springer
Structured query language (SQL) injection is an attack method that explores the functional
and storage vulnerabilities of web applications that have data stored in a database. The …

WebGuardia-An integrated penetration testing system to detect web application vulnerabilities

NM Vithanage, N Jeyamohan - 2016 International Conference …, 2016 - ieeexplore.ieee.org
Due to the immense popularity of the internet, usage of web application has expanded.
Since extremely sensitive information are being exchanged via web applications every day …

Detection of SQL injection and XSS vulnerability in web application

P Singh, K Thevar, P Shetty, B Shaikh - International Journal of …, 2015 - neliti.com
The increasing dependence on web applications has made them a natural target for
attackers. Among these attacks SQL Injection Attacks (SQLIA) and Cross-Site Scripting …

[PDF][PDF] Taxonomy and characterization of structured query language injection attacks for predictive analytics

SA Idowu, O Awodele, SO Kuyoro… - Int. J. Softw. Hardw. Res …, 2020 - academia.edu
Structured Query Language Injection Attacks (SQLIA) from attackers' exploit have
progressively increased the danger of cyber attacks to steal confidential information from the …

[PDF][PDF] Software Engineering Principles and Security Vulnerabilities.

A Rastogi, KE Nygard - CATA, 2019 - easychair.org
Software Engineering principles have connections with design science, including
cybersecurity concerns pertaining to vulnerabilities, trust and reputation. The work of this …

Escrow: A large-scale web vulnerability assessment tool

B Delamore, RKL Ko - … on Trust, Security and Privacy in …, 2014 - ieeexplore.ieee.org
The reliance on Web applications has increased rapidly over the years. At the same time,
the quantity and impact of application security vulnerabilities have grown as well. Amongst …

[PDF][PDF] Enhancing Web Security Through Comprehensive Evaluation of SQL Injection Detection Models

A Jimoh, MK Ahmed, S Salihu, B Mod, MN Salihu - Development, 2024 - toknowpress.net
In the realm of cybersecurity, safeguarding web applications against SQLi attacks is
important; it remains a severe threat to web security, necessitating robust detection methods …

[PDF][PDF] Counterfactual Explanation of a Classification Model for Detecting SQL Injection Attacks

BA Cumi-Guzman, AD Espinosa-Chim… - 2024 - ceur-ws.org
In the realm of cybersecurity, accurately distinguishing between malicious and benign SQL
queries is a critical challenge that impacts database security. Addressing this challenge …