CASE STUDY OF SQL INJECTION ATTACKS
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 5, Issue 7
Abstract
Today, most of the web applications are associated with database at back-end so there are possibilities of SQL injection attacks (SQLIA) on it. A number of preventive measures have also been discovered by various researchers to overcome this attack, but which measure is more convenient and provides fast access to application without compromising the security is also a major concern nowadays. This paper provides a clear distinction among different types of SQLIAs and how these can be performed on local server. Also, demonstration of SQLIAs on live websites is provided for better understanding of URL attacks. Finally, a complete set of guidelines is provided to help understand the causes of various SQLIAs and how to detect them prior and their preventive measures for the developers of database-driven web applications and researchers.
Authors and Affiliations
Sonakshi
REGRESSION MODELS OF DEATHS OCCURRED BY TUBERCULOSIS (TB) DISEASE IN THE SUDAN
This paper aims at studying the regression models that represent the relationship between the deaths that occurred by TB disease as dependent variable and the number of cases of TB. The study was conducted in the...
Analysis of Performance of FLD and CLD Technique
Vibration is undesirable, wasting energy and creating unwanted sound – noise. Sometimes these vibrations cause minor or serious performance or safety problems in engineered systems. Damping is one potential approa...
Design and Implementation of 1kva Uninterrupted Power Supply
The power conditioner designed to deliver an output of 1.0KVA basically it’s composed of a battery control circuit, the inverter and automatic voltage regulator. The inverter stage is the part that will take powe...
Implementation on Distributed Network Services Using SSO for Secure Mechanism
Key Agreement and User Authentication is an prime issues for creating and maintaining a security in distributed network .Legal User may able to access services of different providers. Recently there are some user...
HECC-CHAP BASED PRIVACY PRESERVATION IN DISTRIBUTED INFORMATION SHARING
Dept. of computer Science Security is an important issue during the transmission of data. Privacy Preservation enables various users to send their data to the server privately so that the external users can’t acce...