[PDF][PDF] An adaptive algorithm to prevent SQL injection

A John, A Agarwal, M Bhardwaj - American Journal of Networks and …, 2015 - academia.edu
A John, A Agarwal, M Bhardwaj
American Journal of Networks and Communications, 2015academia.edu
SQL Injection attacks are one of the top most threats for application written for the web. SQL
Injection is a type of attack in which the attacker uses SQL commands to gain access or
make changes to data. It allows attacker to obtain unauthorized access to the database to
change the intended queries. In the web environment, end user privacy is one of the most
controversial legal issues. Using SQL Injection, an attacker can leak confidential information
such as credit card no. ATM Pin, User Credentials etc from the web applications or even …
Abstract
SQL Injection attacks are one of the top most threats for application written for the web. SQL Injection is a type of attack in which the attacker uses SQL commands to gain access or make changes to data. It allows attacker to obtain unauthorized access to the database to change the intended queries. In the web environment, end user privacy is one of the most controversial legal issues. Using SQL Injection, an attacker can leak confidential information such as credit card no. ATM Pin, User Credentials etc from the web applications or even corrupts the database. An unauthorized access to this much of confidential data by an attacker can threat to user confidentiality. In this paper, we had surveyed existing techniques against SQL Injection and analyzed their advantages and disadvantages and proposed a novel and effective solution to avoid attacks on login phase.
academia.edu
以上显示的是最相近的搜索结果。 查看全部搜索结果