Addressing MDX Injection issue in Big Data using ASCII Based String Matching
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 4
Abstract
MDX injection is one of the most threats for application written for Web. Big data is the ability of providing exponential growth and availability of data. Since the data in here are unstructured and therefore normal Query language prevention techniques are not enough for preventing MDX injection attack. Here I proposed a new technique that can address the issue efficiently using ASCII based String Matching algorithm. In this technique Detect Spiteful character, Constraint Validation, Query length validation and Text based Key Generator are the four types of filtration technique used to detect and prevent the Injection Attacks from accessing the database.
Authors and Affiliations
Y Meena Priyadarshini
Load Shedding in Mobile Systems with MobiQual
In location-based, mobile continual query (CQ) systems, two key measures of quality-of-service (QoS) are: freshness and accuracy. To achieve freshness, the CQ server must perform frequent query reevaluations. To atta...
A Survey On Multi_Criteria Offloading Decision For Mobile Cloud Computing In Heterogeneous Network
Mobile cloud computing is an technique where mobile applications be built, motorized by means of cloud computing..Wireless network include incomplete resources similar to battery life,storage space capacity,system ba...
Co-Operative Riskless Data Publishing Using Cpdp In Multi Colud
Cloud computing is a new and fast growing technology that offers an innovative, efficient and scalable business model for organizations to adopt various information technology (IT) resources i.e. software, hardware,...
A Public Auditing Framework for Cloud Storage Security
Commoditization of computing resources has become a reality with cloud computing which is a new computing model. Users are no longer required to invest on procuring computing resources. Instead they use resources pro...
Exploration Distribution And Appliances Problems In Mobile Sensor Networks
This paper goes for examining different exploration issues of executing the portable entryway to coordinate remote sensor system (WSN) and different systems and another strategy for actualizing cell telephones itself...