Review of SQL injection : problems and prevention
SQL injection happened in electronic records in database and it is still exist even after two decades since it first happened. Most of the web-based applications are still vulnerable to the SQL injection attacks. Although technology had improved a lot during these past years, but, hackers still can...
| Main Authors: | Mohd Yunus, Mohd Amin, Brohan, Muhammad Zainulariff, Mohd Nawi, Nazri, Mat Surin, Ely Salwana, Md Najib, Nurhakimah Azwani, Chan, Wei Liang |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Politeknik Negeri Padang
2018
|
| Subjects: | |
| Online Access: | http://eprints.uthm.edu.my/5635/ http://eprints.uthm.edu.my/5635/1/AJ%202018%20%28281%29.pdf |
Similar Items
A Survey on SQL injection: vulnerabilities, attacks, and prevention techniques
by: Kindy, Diallo Abdoulaye, et al.
Published: (2011)
by: Kindy, Diallo Abdoulaye, et al.
Published: (2011)
SQL Injection attack roadmap and fusion
by: Umar, Kabir, et al.
Published: (2016)
by: Umar, Kabir, et al.
Published: (2016)
SQL injection penetration testing tutorial
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
Systematic literature review on SQL injection attack
by: Aminu, Lawal Muhammad, et al.
Published: (2016)
by: Aminu, Lawal Muhammad, et al.
Published: (2016)
Prevention of attack on Islamic websites by fixing SQL injection vulnerabilities using co-evolutionary search approach
by: Umar, Kabir, et al.
Published: (2014)
by: Umar, Kabir, et al.
Published: (2014)
Taxonomy of SQL Injection: ML Trends & Open Challenges
by: Abobakr Busaeed, Raed Abdullah, et al.
Published: (2023)
by: Abobakr Busaeed, Raed Abdullah, et al.
Published: (2023)
Detection of SQL injection attack using machine learning
by: Tung, Tean Thong
Published: (2024)
by: Tung, Tean Thong
Published: (2024)
Lethality of SQL injection against current and future Internet-technologies
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
Comparison of security testing approaches for detection of SQL injection vulnerabilities
by: Mohammed Draib, Najla’a Ateeq, et al.
Published: (2018)
by: Mohammed Draib, Najla’a Ateeq, et al.
Published: (2018)
Application of machine learning and artificial intelligence in detecting SQL injection attacks
by: Md Sultan, Abu Bakar, et al.
Published: (2024)
by: Md Sultan, Abu Bakar, et al.
Published: (2024)
Restaurant O SIX JOINT online ordering system with anti-SQL injection
by: Tang, Jie Yi, et al.
Published: (2021)
by: Tang, Jie Yi, et al.
Published: (2021)
Academic streaming for secondary schools in Malaysia using a twostep clustering technique / Ely Salwana Mat Surin
by: Ely Salwana, Mat Surin
Published: (2015)
by: Ely Salwana, Mat Surin
Published: (2015)
Sistem maklumat pengurusan berdasarkan kajian keberkesanan sistem maklumat kajian kes : Unit Penguatkuasa, Majlis Perbandaran Kulai (MPKu)
by: Mat Surin, Ely Salwana
Published: (2006)
by: Mat Surin, Ely Salwana
Published: (2006)
Enhanced pushdown automaton based static analysis for detection of SQL injection Hotspots in web application
by: Umar, Kabir, et al.
Published: (2016)
by: Umar, Kabir, et al.
Published: (2016)
A walk through SQL injection: vulnerabilities, attacks, and countermeasures in current and future networks
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
A detailed survey on various aspects of SQL Injection: vulnerabilities, innovative attacks, and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011)
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
LogiQL and SQL
by: Halpin, Terry, et al.
Published: (2015)
by: Halpin, Terry, et al.
Published: (2015)
Penetration testing using Kali Linux: SQL injection, XSS, Wordpress, and WPA2 attacks
by: Gunawan, Teddy Surya, et al.
Published: (2018)
by: Gunawan, Teddy Surya, et al.
Published: (2018)
Study on database management system security issues
by: Mohd Yunus, Mohd Amin, et al.
Published: (2017)
by: Mohd Yunus, Mohd Amin, et al.
Published: (2017)
Comparing web vulnerability scanners with a new method for SQL injection vulnerabilities detection and removal EPSQLiFix
by: Md Sultan, Abu Bakar, et al.
Published: (2018)
by: Md Sultan, Abu Bakar, et al.
Published: (2018)
A detailed survey on various aspects of SQL injection in web applications: vulnerabilities, innovative attacks and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
Performance comparison between NoSQL (RethinkDB) and MySQL database replication from master to slave in big data
by: Dildar Hussain,, et al.
Published: (2021)
by: Dildar Hussain,, et al.
Published: (2021)
Verification the performance of Microsoft SQL Server / Nageswary Gannapathy
by: Nageswary , Gannapathy
Published: (2002)
by: Nageswary , Gannapathy
Published: (2002)
A study on microsoft SQL server 2000 / Ireen Munira Ibrahim
by: Ibrahim, Ireen Munira
Published: (2003)
by: Ibrahim, Ireen Munira
Published: (2003)
The effectiveness of development skills plan framework for learning disabilities children: a systematic literature review
by: Zulkifli, Zahidah, et al.
Published: (2018)
by: Zulkifli, Zahidah, et al.
Published: (2018)
The factors that influence the reading habit among Malaysian: a systematic literature review
by: Mohammed, Ahmed Sedik Hassan, et al.
Published: (2019)
by: Mohammed, Ahmed Sedik Hassan, et al.
Published: (2019)
A survey of NewSQL DBMSs focusing on taxonomy, comparison and open issues
by: Abdullah, Muhammed, et al.
Published: (2021)
by: Abdullah, Muhammed, et al.
Published: (2021)
A New Approach to Secure and Manage Load Balancing of the Distributed Database Using SQL Firewall
by: A., Fairuzullah, et al.
by: A., Fairuzullah, et al.
Systematic literature review of prediction techniques to identify work skillset
by: Zawawi, Nurul Saadah, et al.
Published: (2019)
by: Zawawi, Nurul Saadah, et al.
Published: (2019)
SQL-injection vulnerability scanning tool for automatic creation of SQL-injection attacks
by: Bashah Mat Ali, Abdul, et al.
Published: (2011)
by: Bashah Mat Ali, Abdul, et al.
Published: (2011)
SQL-injection vulnerability scanning tool for automatic creation of SQL-injection attacks
by: Mat Ali, Abdul Bashah, et al.
Published: (2011)
by: Mat Ali, Abdul Bashah, et al.
Published: (2011)
The effect of information seeking behavior on online database usage among the undergraduate students
by: Zulkifli, Zahidah, et al.
Published: (2019)
by: Zulkifli, Zahidah, et al.
Published: (2019)
Data Mining in Supplier Selection: A Practical Application Using Microsoft SQL Server 2005
by: Sunarya, Rajasa Utama
Published: (2008)
by: Sunarya, Rajasa Utama
Published: (2008)
Preventing MS SQL Injection in Web Application
by: Khader, Aqeel Sahi
Published: (2010)
by: Khader, Aqeel Sahi
Published: (2010)
Information searching behavior among undergraduate student towards Online database usage
by: Zulkifli, Zahidah, et al.
Published: (2018)
by: Zulkifli, Zahidah, et al.
Published: (2018)
Pembangunan aplikasi mudah alih berdasarkan cadangan model ramalan untuk mengenalpasti kemahiran wanita di era revolusi perindustrian ke-empat (Industri 4.0)
by: Mat Surin, Ely Salwana, et al.
Published: (2018)
by: Mat Surin, Ely Salwana, et al.
Published: (2018)
Prediction of learning disorder: a-systematic review
by: Jamhar, Mohammad Azli, et al.
Published: (2019)
by: Jamhar, Mohammad Azli, et al.
Published: (2019)
Hepatitis C transmission and treatment as prevention - The role of the injecting network
by: Hellard, M., et al.
Published: (2015)
by: Hellard, M., et al.
Published: (2015)
Kajian penerimaan teknologi masyarakat warga emas luar bandar di mukim Beranang, Selangor
by: Ely Salwana Mat Surin,, et al.
Published: (2018)
by: Ely Salwana Mat Surin,, et al.
Published: (2018)
Similar Items
-
A Survey on SQL injection: vulnerabilities, attacks, and prevention techniques
by: Kindy, Diallo Abdoulaye, et al.
Published: (2011) -
SQL Injection attack roadmap and fusion
by: Umar, Kabir, et al.
Published: (2016) -
SQL injection penetration testing tutorial
by: Pathan, Al-Sakib Khan, et al.
Published: (2011) -
Systematic literature review on SQL injection attack
by: Aminu, Lawal Muhammad, et al.
Published: (2016) -
Prevention of attack on Islamic websites by fixing SQL injection vulnerabilities using co-evolutionary search approach
by: Umar, Kabir, et al.
Published: (2014)