SQL Injection attack roadmap and fusion
With SQL Injection, an attacker can change the intended effect of dynamically generated query in a web Application. This can lead to unauthorized access to the database underlying web application, and harmful transactions on the potentially sensitive information contained in the database. Clear unde...
| Main Authors: | Umar, Kabir, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia, Abdullah @ Selimun, Mohd Taufik |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Indian Society for Education and Environment
2016
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/53870/ http://psasir.upm.edu.my/id/eprint/53870/1/SQL%20Injection%20attack%20roadmap%20and%20fusion.pdf |
Similar Items
Prevention of attack on Islamic websites by fixing SQL injection vulnerabilities using co-evolutionary search approach
by: Umar, Kabir, et al.
Published: (2014)
by: Umar, Kabir, et al.
Published: (2014)
Enhanced pushdown automaton based static analysis for detection of SQL injection Hotspots in web application
by: Umar, Kabir, et al.
Published: (2016)
by: Umar, Kabir, et al.
Published: (2016)
Comparing web vulnerability scanners with a new method for SQL injection vulnerabilities detection and removal EPSQLiFix
by: Md Sultan, Abu Bakar, et al.
Published: (2018)
by: Md Sultan, Abu Bakar, et al.
Published: (2018)
Systematic literature review on SQL injection attack
by: Aminu, Lawal Muhammad, et al.
Published: (2016)
by: Aminu, Lawal Muhammad, et al.
Published: (2016)
Application of machine learning and artificial intelligence in detecting SQL injection attacks
by: Md Sultan, Abu Bakar, et al.
Published: (2024)
by: Md Sultan, Abu Bakar, et al.
Published: (2024)
Comparison of security testing approaches for detection of SQL injection vulnerabilities
by: Mohammed Draib, Najla’a Ateeq, et al.
Published: (2018)
by: Mohammed Draib, Najla’a Ateeq, et al.
Published: (2018)
Detection of SQL injection attack using machine learning
by: Tung, Tean Thong
Published: (2024)
by: Tung, Tean Thong
Published: (2024)
On the automation of vulnerabilities fixing for web application
by: Umar, Kabir, et al.
Published: (2014)
by: Umar, Kabir, et al.
Published: (2014)
A Survey on SQL injection: vulnerabilities, attacks, and prevention techniques
by: Kindy, Diallo Abdoulaye, et al.
Published: (2011)
by: Kindy, Diallo Abdoulaye, et al.
Published: (2011)
Defining fitness function for search based assessment of grammar reachability
by: Umar, Kabir, et al.
Published: (2018)
by: Umar, Kabir, et al.
Published: (2018)
A walk through SQL injection: vulnerabilities, attacks, and countermeasures in current and future networks
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
A detailed survey on various aspects of SQL Injection: vulnerabilities, innovative attacks, and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011)
Review of SQL injection : problems and prevention
by: Mohd Yunus, Mohd Amin, et al.
Published: (2018)
by: Mohd Yunus, Mohd Amin, et al.
Published: (2018)
Penetration testing using Kali Linux: SQL injection, XSS, Wordpress, and WPA2 attacks
by: Gunawan, Teddy Surya, et al.
Published: (2018)
by: Gunawan, Teddy Surya, et al.
Published: (2018)
SQL injection penetration testing tutorial
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
A detailed survey on various aspects of SQL injection in web applications: vulnerabilities, innovative attacks and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
Taxonomy of SQL Injection: ML Trends & Open Challenges
by: Abobakr Busaeed, Raed Abdullah, et al.
Published: (2023)
by: Abobakr Busaeed, Raed Abdullah, et al.
Published: (2023)
Towards removing cross-site scripting vulnerabilities from mobile web applications
by: Hydara, Isatou, et al.
Published: (2018)
by: Hydara, Isatou, et al.
Published: (2018)
An approach for cross-site scripting detection and removal based on genetic algorithms.
by: Hydara, Isatou, et al.
Published: (2014)
by: Hydara, Isatou, et al.
Published: (2014)
The limitations of cross-site scripting vulnerabilities detection and removal techniques
by: Hydara, Isatou, et al.
Published: (2021)
by: Hydara, Isatou, et al.
Published: (2021)
Lethality of SQL injection against current and future Internet-technologies
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
Towards cross-site scripting vulnerability detection in mobile web applications
by: Hydara, Isatou, et al.
Published: (2018)
by: Hydara, Isatou, et al.
Published: (2018)
Current state of research on cross-site scripting (XSS) – a systematic literature review
by: Hydara, Isatou, et al.
Published: (2015)
by: Hydara, Isatou, et al.
Published: (2015)
Removing cross-site scripting vulnerabilities from web applications using the OWASP ESAPI security guidelines
by: Hydara, Isatou, et al.
Published: (2015)
by: Hydara, Isatou, et al.
Published: (2015)
Removing cross-site scripting vulnerabilities from web applications using the OWASP ESAPI security guidelines
by: Hydara, Isatou, et al.
Published: (2015)
by: Hydara, Isatou, et al.
Published: (2015)
Cross-site scripting detection based on an enhanced genetic algorithm
by: Hydara, Isatou, et al.
Published: (2015)
by: Hydara, Isatou, et al.
Published: (2015)
Security impact of cross-site scripting vulnerabilities on web applications and their awareness
by: Hydara, Isatou, et al.
Published: (2022)
by: Hydara, Isatou, et al.
Published: (2022)
Restaurant O SIX JOINT online ordering system with anti-SQL injection
by: Tang, Jie Yi, et al.
Published: (2021)
by: Tang, Jie Yi, et al.
Published: (2021)
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
LogiQL and SQL
by: Halpin, Terry, et al.
Published: (2015)
by: Halpin, Terry, et al.
Published: (2015)
Supply-chain roadmapping
by: Yee, Choy Leong
Published: (2012)
by: Yee, Choy Leong
Published: (2012)
Gap analysis in specifying porting requirements for mobile application
by: Rajadorai, Kesava Pillai, et al.
Published: (2016)
by: Rajadorai, Kesava Pillai, et al.
Published: (2016)
An overview of attacks against digital watermarking and their respective countermeasures
by: Tanha, Maryam, et al.
Published: (2012)
by: Tanha, Maryam, et al.
Published: (2012)
VoIP evidence model: a new forensic method for investigating VoIP malicious attacks
by: Ibrahim, Mohammed, et al.
Published: (2012)
by: Ibrahim, Mohammed, et al.
Published: (2012)
Employee Commitment: An Introduction and Roadmap
by: Meyer, John
Published: (2016)
by: Meyer, John
Published: (2016)
Roadmap for 4IR and IoT
by: Hwang, Ha Jin *
Published: (2017)
by: Hwang, Ha Jin *
Published: (2017)
Roadmaps for e-technology management
by: Yee, Choy Leong, et al.
Published: (2011)
by: Yee, Choy Leong, et al.
Published: (2011)
Strategic roadmapping: theory and practice
by: Yee, Choy Leong
Published: (2013)
by: Yee, Choy Leong
Published: (2013)
Performance comparison between NoSQL (RethinkDB) and MySQL database replication from master to slave in big data
by: Dildar Hussain,, et al.
Published: (2021)
by: Dildar Hussain,, et al.
Published: (2021)
Adaptive feature selection for denial of services (DoS) attack
by: Yusof, Ahmad Riza'ain, et al.
Published: (2017)
by: Yusof, Ahmad Riza'ain, et al.
Published: (2017)
Similar Items
-
Prevention of attack on Islamic websites by fixing SQL injection vulnerabilities using co-evolutionary search approach
by: Umar, Kabir, et al.
Published: (2014) -
Enhanced pushdown automaton based static analysis for detection of SQL injection Hotspots in web application
by: Umar, Kabir, et al.
Published: (2016) -
Comparing web vulnerability scanners with a new method for SQL injection vulnerabilities detection and removal EPSQLiFix
by: Md Sultan, Abu Bakar, et al.
Published: (2018) -
Systematic literature review on SQL injection attack
by: Aminu, Lawal Muhammad, et al.
Published: (2016) -
Application of machine learning and artificial intelligence in detecting SQL injection attacks
by: Md Sultan, Abu Bakar, et al.
Published: (2024)