SQL Injection Prevention by Adaptive Algorithm
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 1
Abstract
Abstract: An SQL Injection is one of the most dangerous security issues. SQL injections are dangerous becausethey are a door wide open to hackers to enter your system through your Web interface and to do whatever theyplease - i.e. delete tables, modify databases. The principal behind SQL injection is pretty simple. When anapplication takes user data as an input, there is an opportunity for a malicious user to enter carefully crafteddata that causes the input to be interpreted as part of a SQL query instead of data. Databases are attractivetargets because they typically contain critical application information. SQL injections are a programming errorand they have nothing to do with your web site hosting provider. So, if you have been searching for a secure JSPhosting, PHP hosting or any other type of web hosting packages, you need to know that prevention of an SQLinjection is not a responsibility of your web site hosting provider but of your web developers. In this paper, wehad firstly surveyed different SQL Injection methods and then different techniques against SQL Injection andanalyzed their advantages and disadvantages and proposed a novel and effective solution to avoid attacks on login phase
Authors and Affiliations
Ashish John
Domain Independent Joint Sentiment And Topic Detection UsingAFINN And Other Lexicons
Abstract: Sentiment analysis and opinion mining field concentrates on automatically classifying sentiments of documents. But detecting mere sentiments does not provide one the sufficient knowledge concealed in the text.I...
Soundness to Single Sign on Using OTP in Distributed Networks
In a distributed system, there are numerous service provider. The user must be authenticated to entrance the services provided by the service provider. It is challenging to recall all secret words for users. So to c...
Hiding Negative of an Image using Steganography Even Odd Algorithm for Security Purposes
with the advancement of technology, the threats dealt by user have increased exponentially. Hence security of data is required during storage and transmission of data. Image Steganography is best popular techni...
A Study on Quality of Service for Computer Networks
This paper presents some of the basic concepts of Quality of Service. The major research areas of Quality of Service for Computer Networks are represented. The paper also correlates and compares few of the curren...
Automated Car Number Plate Detection System to detect far number plates
Abstract: The Automatic number plate recognition (ANPR) is a mass reconnaissance strategy that uses optical character recognition on pictures to peruse the tags on vehicles. They can use existing shut circuit TV or stree...