Czasopismo
Tytuł artykułu
Autorzy
Wybrane pełne teksty z tego czasopisma
Warianty tytułu
Konferencja
The Second International Conference on Research in Intelligent and Computing in Engineering
Języki publikacji
Abstrakty
As the World Wide Web has been constantly evolving, many industrial sectors, such as social networking online shopping, e-government and e-banking, they have made their services available on the web. However, this causes malicious attackers makes a main target on Web. SQL Injection is one of the most vulnerable attack. With the help of authenticated user input parameters to change the query's logic hacker insert some SQL character in SQL Statement. When request is produced from client end query is produced. Query have to handle before execution, because client input originates from external as well as it is malicious. Currently security researchers proposed different types of solutions to defeat SQL injection attack. One of the very dangerous web application is Damn Vulnerable Web application (DVWA). There is numerous data inside DVWA to learn beginner. DVWA likewise utilized as a kind of perspective to secure coding, application against SQL Injection is secured if developer is not exactly beyond any doubt about it.
Słowa kluczowe
Rocznik
Tom
Strony
107--110
Opis fizyczny
Bibliogr. 10 poz., rys.
Twórcy
autor
- Department of Information Technology, PCCOE Pune, Injia , gajushinje8046@gmail.com
autor
- Department of Information Technology, PCCOE Pune, Injia , sanjhyawaghere@gmail.com
Bibliografia
- 1. Amir mohammad Sadeghian, Zamani Mazdak, Azizah Abd. Manaf, “SQL Injection Vulnerability General Patch Using Header Sanitization”, 2014 International Conference Computer, Communication and Control Technology.
- 2. Joshi Anamika, V. Geetha, “SQL Injection Detection using Machine Learning”, International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT 2014).
- 3. Buja Geogiana, Dr. Kamarularifin Bin Abd Jalil, Dr. Fakariah Bt. Hj Mohd Ali, Teh Faradilla Abdul Rahman, “Detection Model for SQL Injection Attack: An Approach for Preventing a Web Application from the SQL Injection Attack” 2014 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE) , April 7 - 8, 2014, Penang, Malaysia.
- 4. Lwin Khin Shar and Hee Beng Kuan Tan, “Defeating SQL Injection”,2013 Published by the IEEE Computer Society.
- 5. http://www.dvwa.co.uk/
- 6. http://www.dvwa.co.uk/forum
- 7. http://dvwa.svn.sourceforge.net/svnroot/dvwa
- 8. Djuric Zoran, “A Black-box Testing Tool for Detecting SQL Injection Vulnerabilities” 2013 Informatics and Applications (ICIA),2013 Second International Conference.
- 9. Komiya Ryohei, Paik Incheon, Masayuki Hisada,” Classification of Malicious Web Code by Machine Learning” 2011 Awareness Science and Tec bhnology (iCAST), 2011 3rd International Conference.
- 10. Gupta Mukesh Kumar, Govil Mahesh Chand, Singh Girdhari, “An Approach to Minimize False Positive in SQLI Vulnerabilities Detection Techniques through Data Mining”,2014 Signal Propagation and Computer Technology (ICSPCT), International Conference.
Uwagi
Opracowanie rekordu ze środków MNiSW, umowa nr SONP/SP/546092/2022 w ramach programu "Społeczna odpowiedzialność nauki" - moduł: Popularyzacja nauki i promocja sportu (2024)
Typ dokumentu
Bibliografia
Identyfikatory
DOI
Identyfikator YADDA
bwmeta1.element.baztech-b0b86518-3a53-424f-b64d-c7b87f01c0c2