Systematic literature review on SQL injection attack
SQL injection attack is a common threat to web applications that utilizes poor input validation to implement attack on a target database. It is becoming a very serious problem in web applications as successful execution leads to loss of integrity and confidentiality and this makes it a very sensitiv...
| Main Authors: | Aminu, Lawal Muhammad, Md Sultan, Abu Bakar, Shakiru, Ayanloye O. |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Medwell Journals
2016
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/29102/ http://psasir.upm.edu.my/id/eprint/29102/1/Systematic%20literature%20review%20on%20SQL%20injection%20attack.pdf |
Similar Items
SQL Injection attack roadmap and fusion
by: Umar, Kabir, et al.
Published: (2016)
by: Umar, Kabir, et al.
Published: (2016)
Application of machine learning and artificial intelligence in detecting SQL injection attacks
by: Md Sultan, Abu Bakar, et al.
Published: (2024)
by: Md Sultan, Abu Bakar, et al.
Published: (2024)
Detection of SQL injection attack using machine learning
by: Tung, Tean Thong
Published: (2024)
by: Tung, Tean Thong
Published: (2024)
A Survey on SQL injection: vulnerabilities, attacks, and prevention techniques
by: Kindy, Diallo Abdoulaye, et al.
Published: (2011)
by: Kindy, Diallo Abdoulaye, et al.
Published: (2011)
Prevention of attack on Islamic websites by fixing SQL injection vulnerabilities using co-evolutionary search approach
by: Umar, Kabir, et al.
Published: (2014)
by: Umar, Kabir, et al.
Published: (2014)
Review of SQL injection : problems and prevention
by: Mohd Yunus, Mohd Amin, et al.
Published: (2018)
by: Mohd Yunus, Mohd Amin, et al.
Published: (2018)
A walk through SQL injection: vulnerabilities, attacks, and countermeasures in current and future networks
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
A detailed survey on various aspects of SQL Injection: vulnerabilities, innovative attacks, and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011)
Penetration testing using Kali Linux: SQL injection, XSS, Wordpress, and WPA2 attacks
by: Gunawan, Teddy Surya, et al.
Published: (2018)
by: Gunawan, Teddy Surya, et al.
Published: (2018)
Comparison of security testing approaches for detection of SQL injection vulnerabilities
by: Mohammed Draib, Najla’a Ateeq, et al.
Published: (2018)
by: Mohammed Draib, Najla’a Ateeq, et al.
Published: (2018)
SQL injection penetration testing tutorial
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
A detailed survey on various aspects of SQL injection in web applications: vulnerabilities, innovative attacks and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
Enhanced pushdown automaton based static analysis for detection of SQL injection Hotspots in web application
by: Umar, Kabir, et al.
Published: (2016)
by: Umar, Kabir, et al.
Published: (2016)
Taxonomy of SQL Injection: ML Trends & Open Challenges
by: Abobakr Busaeed, Raed Abdullah, et al.
Published: (2023)
by: Abobakr Busaeed, Raed Abdullah, et al.
Published: (2023)
Lethality of SQL injection against current and future Internet-technologies
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
Comparing web vulnerability scanners with a new method for SQL injection vulnerabilities detection and removal EPSQLiFix
by: Md Sultan, Abu Bakar, et al.
Published: (2018)
by: Md Sultan, Abu Bakar, et al.
Published: (2018)
Systematic literature review and taxonomy for DDoS attack detection and prediction
by: Yusof, Ahmad Riza’ain, et al.
Published: (2019)
by: Yusof, Ahmad Riza’ain, et al.
Published: (2019)
Restaurant O SIX JOINT online ordering system with anti-SQL injection
by: Tang, Jie Yi, et al.
Published: (2021)
by: Tang, Jie Yi, et al.
Published: (2021)
Systematic literature review on search based software testing
by: Md Sultan, Abu Bakar, et al.
Published: (2013)
by: Md Sultan, Abu Bakar, et al.
Published: (2013)
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
LogiQL and SQL
by: Halpin, Terry, et al.
Published: (2015)
by: Halpin, Terry, et al.
Published: (2015)
A systematic literature review on necessity,challenges, applications and attacks of watermarking relational database
by: Alfagi, Abdalrahman, et al.
Published: (2017)
by: Alfagi, Abdalrahman, et al.
Published: (2017)
AI-based techniques for DDoS Attack Detection in WSN: a
systematic literature review
by: Mohammed, Al-Naeem, et al.
Published: (2020)
by: Mohammed, Al-Naeem, et al.
Published: (2020)
Systematic literature review : the important factors in assessing the trustworthiness of OSS.
by: Md. Sultan, Abu Bakar, et al.
Published: (2013)
by: Md. Sultan, Abu Bakar, et al.
Published: (2013)
Preliminary systematic literature review on the adoption of Security as a Service (SECaaS)
by: Tanko, Mohammed Yahaya, et al.
Published: (2023)
by: Tanko, Mohammed Yahaya, et al.
Published: (2023)
Does the initiation of urate lowering treatment during an acute gout attack prolong the current episode and precipitate recurrent attacks: a systematic literature review
by: Eminaga, Fatma, et al.
Published: (2016)
by: Eminaga, Fatma, et al.
Published: (2016)
Software quality: predicting reliability of a software using decision tree
by: Shakiru, Ayanloye O., et al.
Published: (2014)
by: Shakiru, Ayanloye O., et al.
Published: (2014)
Current state of research on cross-site scripting (XSS) – a systematic literature review
by: Hydara, Isatou, et al.
Published: (2015)
by: Hydara, Isatou, et al.
Published: (2015)
Performance comparison between NoSQL (RethinkDB) and MySQL database replication from master to slave in big data
by: Dildar Hussain,, et al.
Published: (2021)
by: Dildar Hussain,, et al.
Published: (2021)
Verification the performance of Microsoft SQL Server / Nageswary Gannapathy
by: Nageswary , Gannapathy
Published: (2002)
by: Nageswary , Gannapathy
Published: (2002)
Sentiment analysis for Malay language: systematic literature review
by: Handayani, Dini, et al.
Published: (2018)
by: Handayani, Dini, et al.
Published: (2018)
A systematic literature review and analysis of visual pollution
by: Gao, Hangyu, et al.
Published: (2024)
by: Gao, Hangyu, et al.
Published: (2024)
Effectiveness of structured query language injection attacks detection mechanisms
by: Mohamad, Nurul Zawiyah
Published: (2008)
by: Mohamad, Nurul Zawiyah
Published: (2008)
Stakeholder quantification and prioritisation research: A systematic literature review
by: Hujainah, Fadhl, et al.
Published: (2018)
by: Hujainah, Fadhl, et al.
Published: (2018)
SQL-injection vulnerability scanning tool for automatic creation of SQL-injection attacks
by: Bashah Mat Ali, Abdul, et al.
Published: (2011)
by: Bashah Mat Ali, Abdul, et al.
Published: (2011)
SQL-injection vulnerability scanning tool for automatic creation of SQL-injection attacks
by: Mat Ali, Abdul Bashah, et al.
Published: (2011)
by: Mat Ali, Abdul Bashah, et al.
Published: (2011)
A study on microsoft SQL server 2000 / Ireen Munira Ibrahim
by: Ibrahim, Ireen Munira
Published: (2003)
by: Ibrahim, Ireen Munira
Published: (2003)
A systematic literature review of skyline query processing over data stream
by: Mudathir Ahmed, Mohamud, et al.
Published: (2023)
by: Mudathir Ahmed, Mohamud, et al.
Published: (2023)
A systematic literature review of skyline query processing over data stream
by: Mohamud, Mudathir Ahmed, et al.
Published: (2023)
by: Mohamud, Mudathir Ahmed, et al.
Published: (2023)
Technostress and job outcomes: a systematic literature review
by: Mohd Iqhsan Shahfarie Hj Ibrahim,, et al.
Published: (2023)
by: Mohd Iqhsan Shahfarie Hj Ibrahim,, et al.
Published: (2023)
Similar Items
-
SQL Injection attack roadmap and fusion
by: Umar, Kabir, et al.
Published: (2016) -
Application of machine learning and artificial intelligence in detecting SQL injection attacks
by: Md Sultan, Abu Bakar, et al.
Published: (2024) -
Detection of SQL injection attack using machine learning
by: Tung, Tean Thong
Published: (2024) -
A Survey on SQL injection: vulnerabilities, attacks, and prevention techniques
by: Kindy, Diallo Abdoulaye, et al.
Published: (2011) -
Prevention of attack on Islamic websites by fixing SQL injection vulnerabilities using co-evolutionary search approach
by: Umar, Kabir, et al.
Published: (2014)