Protection of Web Application against Sql Injection Attacks
Journal Title: International Journal of Modern Engineering Research (IJMER) - Year 2013, Vol 3, Issue 1
Abstract
Abstract: SQL injection attack is the most common attack in websites now-a-days. Some malicious codes gets injected to the database by unauthorized users and because of this attack, the actual database can be stolen or destroyed or modified or the device can be taken control by the hacker. The main cause of this type of attacks is poor coding by the developers. Hence, the login phase is more vulnerable to SQL injection attack and prevention technique should be applied on this phase to secure the database. In this paper, some predefined methods are discussed and hybrid encryption method is applied in the database to avoid attack on login phase. This applied hybrid encryption method is a combination of Advanced Encryption Standard (AES) and Rabin cryptosystem. These two level encryption methods are applied to a system where faculty’s information are kept and the designing of this system are done by using PHP and MYSQL.
Authors and Affiliations
Sonam Panda
Applications of Artificial Neural Network and Wavelet Transform For Condition Monitoring of the Combined Faults of Unbalance and Bearing Clearance
The vibration analysis of rotating machinery indicates of the condition of potential faults such as unbalance, bent shaft, shaft crack, bearing clearance, rotor rub, misalignment, looseness, oil whirl and whip an...
Improving Distribution Feeders for Photovoltaic Generation by Loop Power Control Method
Now a day’s solar power plants are more reliable, because no fuel and reduced CO2 emission. But the solar power generation system do not work in all weather conditions, it is power generated only solar radiatio...
Enhanced Energy Aware Geographic Routing Protocol in MANET: A Review
Abstract: Mobile ad hoc networks (MANET) are characterized by multi-hop wireless links and resource constrained nodes. One of the major challenges in mobile ad hoc networks (MANETs) is link failures due to mobility...
Suitability of Composite Material for Flywheel Analysis
The paper deals with analysis of flywheel in which comparison of flywheel existing material and test material are done. There must be proper design and analysis of flywheel in order to meet the necessity to smo...
Topologies in Unstructured Peer To Peer Networks
Abstract: The Peer-to-Peer (P2P) architectures that are most prevalent in today's Internet are decentralized and unstructured. As the peers participating in unstructured networks interconnect randomly, they rely on...