Comparison of security testing approaches for detection of SQL injection vulnerabilities
Structured query language injection vulnerability (SQLIV) is one of the most prevalent and serious web application vulnerabilities that can be exploited by SQL injection attack (SQLIA) to gain unauthorized access to restricted data, bypass authentication mechanism, and execute unauthorized data mani...
| Main Authors: | Mohammed Draib, Najla’a Ateeq, Md Sultan, Abu Bakar, Abd Ghani, Abdul Azim, Zulzalil, Hazura |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Science Publishing Corporation
2018
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/72074/ http://psasir.upm.edu.my/id/eprint/72074/1/Comparison%20of%20Security%20Testing%20Approaches%20for%20Detection%20of.pdf |
Similar Items
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
Comparing web vulnerability scanners with a new method for SQL injection vulnerabilities detection and removal EPSQLiFix
by: Md Sultan, Abu Bakar, et al.
Published: (2018)
by: Md Sultan, Abu Bakar, et al.
Published: (2018)
SQL Injection attack roadmap and fusion
by: Umar, Kabir, et al.
Published: (2016)
by: Umar, Kabir, et al.
Published: (2016)
Prevention of attack on Islamic websites by fixing SQL injection vulnerabilities using co-evolutionary search approach
by: Umar, Kabir, et al.
Published: (2014)
by: Umar, Kabir, et al.
Published: (2014)
Enhanced pushdown automaton based static analysis for detection of SQL injection Hotspots in web application
by: Umar, Kabir, et al.
Published: (2016)
by: Umar, Kabir, et al.
Published: (2016)
A Survey on SQL injection: vulnerabilities, attacks, and prevention techniques
by: Kindy, Diallo Abdoulaye, et al.
Published: (2011)
by: Kindy, Diallo Abdoulaye, et al.
Published: (2011)
An autonomous software approach to enhance information sharing in university course timetable planning
by: Mohammed Draib, Najla'a Ateeq, et al.
Published: (2015)
by: Mohammed Draib, Najla'a Ateeq, et al.
Published: (2015)
SQL injection penetration testing tutorial
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
Systematic literature review on SQL injection attack
by: Aminu, Lawal Muhammad, et al.
Published: (2016)
by: Aminu, Lawal Muhammad, et al.
Published: (2016)
Application of machine learning and artificial intelligence in detecting SQL injection attacks
by: Md Sultan, Abu Bakar, et al.
Published: (2024)
by: Md Sultan, Abu Bakar, et al.
Published: (2024)
A walk through SQL injection: vulnerabilities, attacks, and countermeasures in current and future networks
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
A detailed survey on various aspects of SQL Injection: vulnerabilities, innovative attacks, and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011)
The importance of information sharing automation for university timetable planning
by: Md Sultan, Abu Bakar, et al.
Published: (2015)
by: Md Sultan, Abu Bakar, et al.
Published: (2015)
Detection of SQL injection attack using machine learning
by: Tung, Tean Thong
Published: (2024)
by: Tung, Tean Thong
Published: (2024)
Review of SQL injection : problems and prevention
by: Mohd Yunus, Mohd Amin, et al.
Published: (2018)
by: Mohd Yunus, Mohd Amin, et al.
Published: (2018)
A detailed survey on various aspects of SQL injection in web applications: vulnerabilities, innovative attacks and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
Security impact of cross-site scripting vulnerabilities on web applications and their awareness
by: Hydara, Isatou, et al.
Published: (2022)
by: Hydara, Isatou, et al.
Published: (2022)
The limitations of cross-site scripting vulnerabilities detection and removal techniques
by: Hydara, Isatou, et al.
Published: (2021)
by: Hydara, Isatou, et al.
Published: (2021)
An approach for vulnerability detection in web applications using graph neural networks and transformers
by: Md Sultan, Abu Bakar, et al.
Published: (2024)
by: Md Sultan, Abu Bakar, et al.
Published: (2024)
Towards cross-site scripting vulnerability detection in mobile web applications
by: Hydara, Isatou, et al.
Published: (2018)
by: Hydara, Isatou, et al.
Published: (2018)
Taxonomy of SQL Injection: ML Trends & Open Challenges
by: Abobakr Busaeed, Raed Abdullah, et al.
Published: (2023)
by: Abobakr Busaeed, Raed Abdullah, et al.
Published: (2023)
Removing cross-site scripting vulnerabilities from web applications using the OWASP ESAPI security guidelines
by: Hydara, Isatou, et al.
Published: (2015)
by: Hydara, Isatou, et al.
Published: (2015)
Removing cross-site scripting vulnerabilities from web applications using the OWASP ESAPI security guidelines
by: Hydara, Isatou, et al.
Published: (2015)
by: Hydara, Isatou, et al.
Published: (2015)
Penetration testing using Kali Linux: SQL injection, XSS, Wordpress, and WPA2 attacks
by: Gunawan, Teddy Surya, et al.
Published: (2018)
by: Gunawan, Teddy Surya, et al.
Published: (2018)
Lethality of SQL injection against current and future Internet-technologies
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
Restaurant O SIX JOINT online ordering system with anti-SQL injection
by: Tang, Jie Yi, et al.
Published: (2021)
by: Tang, Jie Yi, et al.
Published: (2021)
On the automation of vulnerabilities fixing for web application
by: Umar, Kabir, et al.
Published: (2014)
by: Umar, Kabir, et al.
Published: (2014)
Towards removing cross-site scripting vulnerabilities from mobile web applications
by: Hydara, Isatou, et al.
Published: (2018)
by: Hydara, Isatou, et al.
Published: (2018)
Performance comparison between NoSQL (RethinkDB) and MySQL database replication from master to slave in big data
by: Dildar Hussain,, et al.
Published: (2021)
by: Dildar Hussain,, et al.
Published: (2021)
LogiQL and SQL
by: Halpin, Terry, et al.
Published: (2015)
by: Halpin, Terry, et al.
Published: (2015)
Reducing test suite of state-sensitivity partitioning (SSP)
by: Sultan, Ammar Mohammed, et al.
Published: (2018)
by: Sultan, Ammar Mohammed, et al.
Published: (2018)
Evolutionary cost cognizant regression test prioritization for object-oriented programs based on fault dependency
by: Bello, AbdulKarim, et al.
Published: (2018)
by: Bello, AbdulKarim, et al.
Published: (2018)
A survey of NewSQL DBMSs focusing on taxonomy, comparison and open issues
by: Abdullah, Muhammed, et al.
Published: (2021)
by: Abdullah, Muhammed, et al.
Published: (2021)
A New Approach to Secure and Manage Load Balancing of the Distributed Database Using SQL Firewall
by: A., Fairuzullah, et al.
by: A., Fairuzullah, et al.
Analysis of access control model for data security and privacy on multi-tenant SaaS
by: Duraisamy, Gunavathi, et al.
Published: (2018)
by: Duraisamy, Gunavathi, et al.
Published: (2018)
Preliminary systematic literature review on the adoption of Security as a Service (SECaaS)
by: Tanko, Mohammed Yahaya, et al.
Published: (2023)
by: Tanko, Mohammed Yahaya, et al.
Published: (2023)
A preliminary study of adaptive random testing techniques
by: Mohd. Sidek, Roslina, et al.
Published: (2015)
by: Mohd. Sidek, Roslina, et al.
Published: (2015)
Model-based testing of access control requirement in multi-tenant application: an extensive life cycle
by: Duraisamy, Gunavathi, et al.
Published: (2022)
by: Duraisamy, Gunavathi, et al.
Published: (2022)
Mobile Quran app security vulnerabilities
by: Talib, Shuhaili, et al.
Published: (2015)
by: Talib, Shuhaili, et al.
Published: (2015)
Prioritizing event sequences test cases based on faults
by: Baharom, Salmi, et al.
Published: (2018)
by: Baharom, Salmi, et al.
Published: (2018)
Similar Items
-
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
by: Draib, Najla'a Ateeq Mohammed
Published: (2022) -
Comparing web vulnerability scanners with a new method for SQL injection vulnerabilities detection and removal EPSQLiFix
by: Md Sultan, Abu Bakar, et al.
Published: (2018) -
SQL Injection attack roadmap and fusion
by: Umar, Kabir, et al.
Published: (2016) -
Prevention of attack on Islamic websites by fixing SQL injection vulnerabilities using co-evolutionary search approach
by: Umar, Kabir, et al.
Published: (2014) -
Enhanced pushdown automaton based static analysis for detection of SQL injection Hotspots in web application
by: Umar, Kabir, et al.
Published: (2016)