A review of SQL injection attack and various detection approaches

N Bhateja, S Sikka, A Malhotra - Smart and Sustainable …, 2021 - Wiley Online Library
Smart and Sustainable Intelligent Systems, 2021Wiley Online Library
In today's world, many of our interactions are with Web applications, HTML5 based hybrid
mobile applications and IoT devices. These applications and devices have a database at the
back‐end which can contain sensitive information. The information might contain personal
details as well as information which are not meant to be altered illicitly. Hackers are always
looking to penetrate into the databases to gather information which can later be used for
illegal purposes. Such breaches can cause harm to the individual as well as the …
Summary
In today's world, many of our interactions are with Web applications, HTML5 based hybrid mobile applications and IoT devices. These applications and devices have a database at the back‐end which can contain sensitive information. The information might contain personal details as well as information which are not meant to be altered illicitly. Hackers are always looking to penetrate into the databases to gather information which can later be used for illegal purposes. Such breaches can cause harm to the individual as well as the organization responsible for managing that data. One such method is to use SQL injection attacks (SQLIAs). It enables the hacker to create SQL queries which can be used to alter or retrieve the state of the database. The paper is based on a review of various SQL injection approaches with the methods available to counter these attacks.
Wiley Online Library
以上显示的是最相近的搜索结果。 查看全部搜索结果