SQL Injection Attack and Method for Detection and Prevention in ASP.NET Web Applications
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 12
Abstract
In This paper, we propose a technique, which uses runtime validation to detect the occurrence of such attacks, which evaluation methodology is general and adaptable to any existing system. There is a need to protect databases. In this a IDPS system is developed to analyze the values submitted by users through HTML forms and look for possible attack patterns. Once the system finds such a pattern, it blocks the attack and makes a record of the activity. If an attacker continues to pass such attack patterns, the system blocks access by this user altogether. This provides a combination of pattern-based detection and anomaly-based detection to create a reasonably robust intrusion detection system(IDS), with respect to SQL-I attacks.
Authors and Affiliations
Rahul Sharma, Sharad Chauhan, Kamal Sharma
Various Attacks Including JellyFish Attack Along With Security Issues In Manet
The MANET which is termed as Mobile Adhoc network works like a wireless network with unrestricted mobility and without any infrastructure. To design a new security mechanism for MANET various attack variations as well a...
Performance Evaluation of Image Encryption Using Separable Reversible Data Hiding Scheme
Image Encryption has a significant role in the field of cryptography. In the proposed scheme compression technique is introduced after the encryption and data hiding process to reduce the image size for faster transmiss...
Strange Quark Matter Coupled to the String Cloud in Kaluza-Klein Theory of Gravitation
The solution are obtained for quark matter coupled to the string cloud in Kaluza-Klein theory of gravitation. The features of the obtained solutions are also discussed.
Evolution of Routing Protocols for Wireless Sensor Networks – A Survey
WSN is a set of small power energy confined sensor nodes which can dynamically forms a network without the use of an existing network or without the use of a centralized administration. In WSN, the biggest constraint is...
Study of Mechanical Characteristics on Hybrid Composites Using Sisal Fiber and Banana Fiber
Fiber reinforced polymer composites have a wide variety of applications as a class of structural materials because of their advantages such as ease of manufacturing, comparatively minimum cost of production & greater st...