A detailed survey on various aspects of SQL injection in web applications: vulnerabilities, innovative attacks and remedies
In today’s world, Web applications play a very important role in individual life as well as in any country’s development. Web applications have gone through a very rapid growth in the recent years and their adoption is moving faster than that was expected few years ago. Now-a-days, billions of trans...
| Main Authors: | Diallo , Abdoulaye Kindy, Pathan, Al-Sakib Khan |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
KUST Press, Pakistan
2013
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/31262/ http://irep.iium.edu.my/31262/1/364-882-1-PB.pdf |
Similar Items
A detailed survey on various aspects of SQL Injection: vulnerabilities, innovative attacks, and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011)
A Survey on SQL injection: vulnerabilities, attacks, and prevention techniques
by: Kindy, Diallo Abdoulaye, et al.
Published: (2011)
by: Kindy, Diallo Abdoulaye, et al.
Published: (2011)
A walk through SQL injection: vulnerabilities, attacks, and countermeasures in current and future networks
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
Lethality of SQL injection against current and future Internet-technologies
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
SQL injection penetration testing tutorial
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
Review of SQL injection : problems and prevention
by: Mohd Yunus, Mohd Amin, et al.
Published: (2018)
by: Mohd Yunus, Mohd Amin, et al.
Published: (2018)
Taxonomy of SQL Injection: ML Trends & Open Challenges
by: Abobakr Busaeed, Raed Abdullah, et al.
Published: (2023)
by: Abobakr Busaeed, Raed Abdullah, et al.
Published: (2023)
Penetration testing using Kali Linux: SQL injection, XSS, Wordpress, and WPA2 attacks
by: Gunawan, Teddy Surya, et al.
Published: (2018)
by: Gunawan, Teddy Surya, et al.
Published: (2018)
LogiQL and SQL
by: Halpin, Terry, et al.
Published: (2015)
by: Halpin, Terry, et al.
Published: (2015)
SQL Injection attack roadmap and fusion
by: Umar, Kabir, et al.
Published: (2016)
by: Umar, Kabir, et al.
Published: (2016)
SQL-injection vulnerability scanning tool for automatic creation of SQL-injection attacks
by: Bashah Mat Ali, Abdul, et al.
Published: (2011)
by: Bashah Mat Ali, Abdul, et al.
Published: (2011)
SQL-injection vulnerability scanning tool for automatic creation of SQL-injection attacks
by: Mat Ali, Abdul Bashah, et al.
Published: (2011)
by: Mat Ali, Abdul Bashah, et al.
Published: (2011)
Verification the performance of Microsoft SQL Server / Nageswary Gannapathy
by: Nageswary , Gannapathy
Published: (2002)
by: Nageswary , Gannapathy
Published: (2002)
Systematic literature review on SQL injection attack
by: Aminu, Lawal Muhammad, et al.
Published: (2016)
by: Aminu, Lawal Muhammad, et al.
Published: (2016)
Preventing persistent cross-site scripting (XSS) attack by applying pattern filtering approach
by: Yusof, Imran, et al.
Published: (2014)
by: Yusof, Imran, et al.
Published: (2014)
Analysis of web worm attack on web application
by: Mohd. Ghazzali, Amalina
Published: (2008)
by: Mohd. Ghazzali, Amalina
Published: (2008)
Using routers and honeypots in combination for collecting Internet worm attacks
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014)
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014)
Prevention of attack on Islamic websites by fixing SQL injection vulnerabilities using co-evolutionary search approach
by: Umar, Kabir, et al.
Published: (2014)
by: Umar, Kabir, et al.
Published: (2014)
An efficient detection model of selective forwarding attacks in wireless mesh networks
by: Khanam, Shapla, et al.
Published: (2012)
by: Khanam, Shapla, et al.
Published: (2012)
Detection of SQL injection attack using machine learning
by: Tung, Tean Thong
Published: (2024)
by: Tung, Tean Thong
Published: (2024)
Effectiveness of structured query language injection attacks detection mechanisms
by: Mohamad, Nurul Zawiyah
Published: (2008)
by: Mohamad, Nurul Zawiyah
Published: (2008)
Comparing web vulnerability scanners with a new method for SQL injection vulnerabilities detection and removal EPSQLiFix
by: Md Sultan, Abu Bakar, et al.
Published: (2018)
by: Md Sultan, Abu Bakar, et al.
Published: (2018)
Security attacks and challenges in wireless sensor networks
by: Pathan, Al-Sakib Khan
Published: (2008)
by: Pathan, Al-Sakib Khan
Published: (2008)
On protecting data storage in mobile cloud computing paradigm
by: Abdalla , Al-kindy Athman, et al.
Published: (2014)
by: Abdalla , Al-kindy Athman, et al.
Published: (2014)
Comparison of security testing approaches for detection of SQL injection vulnerabilities
by: Mohammed Draib, Najla’a Ateeq, et al.
Published: (2018)
by: Mohammed Draib, Najla’a Ateeq, et al.
Published: (2018)
The impact of SQL injection attacks on the security of databases
by: Thiyab, Rua Mohamed, et al.
Published: (2017)
by: Thiyab, Rua Mohamed, et al.
Published: (2017)
Future trends in security issues in internet and web applications
by: Pathan, Al-Sakib Khan, et al.
Published: (2012)
by: Pathan, Al-Sakib Khan, et al.
Published: (2012)
A review on level of detail
by: Tan, Kim Heok, et al.
Published: (2004)
by: Tan, Kim Heok, et al.
Published: (2004)
Web-Based Reporting Vulnerabilities System for Cyber Security
Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
Knowledge details in web forums: how high or low above the ground?
by: Abd. Rozan, Mohd. Zaidi, et al.
Published: (2006)
by: Abd. Rozan, Mohd. Zaidi, et al.
Published: (2006)
Learning Qur’anic Arabic through interactive Web-based software: a pragmatic approach in language for specific purpose
by: Abdullah, Matin Saad, et al.
Published: (2013)
by: Abdullah, Matin Saad, et al.
Published: (2013)
Extending W2000 framework to design presentational aspects of web applications.
by: Ahmad@Sharif, Mohd. Nazir, et al.
Published: (2003)
by: Ahmad@Sharif, Mohd. Nazir, et al.
Published: (2003)
Using the web for critical learning of al-Qur’an’s language: an exploratory case study
by: Abdullah, Matin Saad, et al.
Published: (2012)
by: Abdullah, Matin Saad, et al.
Published: (2012)
An Action Arcade Web Based Game-Slime Attack Plus (Slime Invader)
by: Ong, Hui Huang
Published: (2017)
by: Ong, Hui Huang
Published: (2017)
Application of machine learning and artificial intelligence in detecting SQL injection attacks
by: Md Sultan, Abu Bakar, et al.
Published: (2024)
by: Md Sultan, Abu Bakar, et al.
Published: (2024)
An Action Arcade Web-Based Game – Slime Attack Plus (Stack-O-Slime)
by: Chan, Hoong Wai
Published: (2017)
by: Chan, Hoong Wai
Published: (2017)
A web-based approach for the KICT evaluation system
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
A New Approach to Secure and Manage Load Balancing of the Distributed Database Using SQL Firewall
by: A., Fairuzullah, et al.
by: A., Fairuzullah, et al.
Vulnerability Detection System (Xposed)
by: Nurin Azyyati, Kamilizahri
Published: (2023)
by: Nurin Azyyati, Kamilizahri
Published: (2023)
Similar Items
-
A detailed survey on various aspects of SQL Injection: vulnerabilities, innovative attacks, and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011) -
A Survey on SQL injection: vulnerabilities, attacks, and prevention techniques
by: Kindy, Diallo Abdoulaye, et al.
Published: (2011) -
A walk through SQL injection: vulnerabilities, attacks, and countermeasures in current and future networks
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013) -
Lethality of SQL injection against current and future Internet-technologies
by: Pathan, Al-Sakib Khan, et al.
Published: (2014) -
SQL injection penetration testing tutorial
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)