Prevention of SQL Injection Attacks having XML Database
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 14, Issue 6
Abstract
XML-based Web applications are broadly utilized in computer world, whose main applications are remote operation performance and bring arbitrary data. It is recently used in cloud interfaces, E-Government, Service Oriented Architectures etc. Due to abundant acceptance of this technology large attacks are raised like Denial of Service attacks, attacks on XML Encryption, and XML Signature Wrapping attacks. To stop these types of attacks different techniques were proposed however they’re not enough to stop all varieties of attacks. The existing SQLIA prevention techniques can validate the client side data, one by one. It complicates the developer’s task to write different validation codes for each data receiving page in the server. This paper proposed an idea of XML based SQLIA prevention technique which can validate the entire client side data by one single call of the dedicated validation function. In this process, the client will submit data in XML format and the server will verify the entire incoming XML file, based on some pr-decided rules called data-rules.
Authors and Affiliations
Preshika Tiwari
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Based Technique
Online Social Networks (OSNs) are today one of the most popular interactive medium to share, communicate, and distribute a significant amount of human life information. In OSNs, information filtering can a...
Mining Frequent Patterns with Optimized Candidate Representation on GPU using Parallel Eclat Algorithm
Frequent itemset mining is one of the important aspects of association rule mining. The primary algorithm based for frequent itemset mining is mostly based on CPU and they generated a large set of items that are required...
Qos Parameters of an Energy Efficient Multicast Congestion Control Protocol (Eemccp) Over Fading Channels
In this paper we propose an energy efficient multicasting congestion control protocol for mobile ad hoc networks (MANETs) over fading channels. Our proposed scheme overcomes the disadvantages of existing multicast conges...
Efficient and Accurate Target Sensor Tracking in Wireless Sensor Networks
Abstract: In the tracking scheme illustrated, where the sensors are deployed in a triangular fashion in a hexagonal mesh such that the hexagon is divided into a number of equilateral triangles. Where the technique is use...
Performance Evaluation of Wlan by Varying Pcf, Dcf and Enhanced Dcf Slots To Improve Quality of Service
Researchers have proposed a number of co-ordination functions in literature for improving quality of service. Each one is based on different characteristics and properties. In this paper, we evaluate the perfor...