A novel technique to prevent SQL injection and cross-site scripting attacks using Knuth-Morris-Pratt string match algorithm

OC Abikoye, A Abubakar, AH Dokoro… - EURASIP Journal on …, 2020 - Springer
Abstract Structured Query Language (SQL) injection and cross-site scripting remain a major
threat to data-driven web applications. Instances where hackers obtain unrestricted access …

SQL injection attacks-a systematic review

K Sharma, S Bhatt - International journal of information and …, 2019 - inderscienceonline.com
In today's era, each and every person is utilising websites and so many different web
applications for online administrations, for example: booking of railway tickets, movie …

An agent based intelligent dynamic vulnerability analysis framework for critical SQLIA attacks: Intelligent SQLIA vulnerability analyzer agent

JM Dharmalingam, M Eswaran - International Journal of Intelligent …, 2018 - igi-global.com
This article describes how software vulnerability analysis and testing for web applications
should detect not only the common attacks but also dynamic vulnerability attacks. These are …

[PDF][PDF] A detailed study on prevention of SQLI attacks for web security

N Verma, A Kaur - … Journal of Computer Applications Technology and …, 2015 - ijcatr.com
SQL injection is the major susceptible attack in today's era of web application which attacks
the database to gain unauthorized and illicit access. It works as an intermediate between …

Implementación de un Sistema Web para mejorar los procesos de registro de datos y ventas en la Empresa Ceramor SAC Puente Piedra–2021

C Mendoza Velasquez, PB Campos Villanueva - 2023 - repositorio.uch.edu.pe
La implementación del sistema web se desarrolló en la empresa Ceramor SAC que tiene
como misión fabricar y comercializar productos cerámicos. El problema encontrado en esta …

[HTML][HTML] Napadi ubacivanjem SQL izraza–prevencija i obrana

N Ljubičić, D Jakšić, P Poščić - Zbornik Veleučilišta u Rijeci, 2020 - hrcak.srce.hr
Sažetak Napad ubacivanjem SQL izraza jedna je od najozbiljnijih prijetnji sigurnosti
aplikacija zasnovanih nad bazom podataka. Ona omogućuje napadaču da stekne kontrolu …

[PDF][PDF] Analysis of various levels of penetration by SQL injection technique through DVWA'

A Kumar, S Taterh - Journal of Advanced Computing and …, 2016 - academia.edu
In this paper, we represent a comparative analysis of several levels of SQL Injection
vulnerabilities, attacks. We are now going to define SQLI. It is very harmful and directly …

An Optimistic Security Model for Improving Cyber Security Using Adaptive Algorithms to Prevent SQL Injection Attacks

PS Raju, PV Rao - International Journal of Security and Privacy in …, 2021 - igi-global.com
Throughout today's economic and social life, the use of web-based services (such as e-
commerce, online banking, and web-based communications, to name a few) has become a …

Intelligent Vulnerability Analyzer–A Novel Dynamic Vulnerability Analysis Framework for Mobile Based Online Applications

D Jeya Mala, M Eswaran, N Deepika Malar - Smart and Innovative Trends …, 2018 - Springer
As per the survey taken by Computer Security Institute (2002), due to the evolution of
internet technology and application popularization, security has become the key issue for …

[HTML][HTML] SQL INJECTION–PREVENTION AND DEFENSE

N Ljubičić, D Jakšić, P Poščić - Zbornik Veleučilišta u Rijeci, 2020 - hrcak.srce.hr
Sažetak SQL injection is one of the most serious security threats to applications that have
their own database. In fact, it allows the attacker to gain control of the application database …