Analysis of SQL Injection Attacks on Website Service
Journal Title: bit-Tech - Year 2018, Vol 1, Issue 1
Abstract
Among the various types of software vulnerabilities, command injection is the most common type of threat in web applications. In command injection, SQL injection type of attacks are extremely prevalent, and ranked as the second most common form of attack on web. SQL injection attacks involve the construction of application’s input data that will result in the execution of malicious SQL statements. Most of the SQL injection detection techniques involve the code to be written along with the actual scripting code. These techniques do not detect errors in SQL statements. Hence, this paper proposes a mechanism to identify invalid SQL statements, to analyze the query for invalid non SQL key words, and to customize the captured errors. This mechanism is different from others by means of separation of the main scripting code and SQL injection code
Authors and Affiliations
Gregorius Hendita Artha Kusuma
Design And Development Of Sales E-Monitoring Information System Case Study : PT. Pratama Inti Distribusindo
We must recognize the development of technology at this time has developed very rapidly in this era of globalization. Moreover, the development of internet-based computer technology. By using the internet we can search f...
Android-Based Information System Of Online Teaching Services With Geo-Location Determination
The information system of online teaching services with geo-location determination is a system that brings together and arranging meetings between private tutors and people looking for private tutors through Android appl...
Improving Services To Communities In Pringsewu District Goverment With E-Government Concept
The dynamics of the development of information technology that occurred in the global era as it is now has changed many of the procedures of various organizations in its management, both profit-oriented and non-profit-or...
Analysis of SQL Injection Attacks on Website Service
Among the various types of software vulnerabilities, command injection is the most common type of threat in web applications. In command injection, SQL injection type of attacks are extremely prevalent, and ranked as the...
Voice Over Internet Protocol Based Communication Design (VoIP) With 3CXSystemPhone On Android Smartphone
TCP\IP protocol can be connected to various computer data networks in the world. This protocol increasingly exists and is needed so that many parties develop it to vote through this protocol. Voice Over Internet Protocol...