To see the other types of publications on this topic, follow the link: Sql-injection.

Journal articles on the topic 'Sql-injection'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Sql-injection.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Bisson, R. "SQL injection." ITNOW 47, no. 2 (2005): 25. http://dx.doi.org/10.1093/itnow/bwi039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shar, Lwin Khin, and Hee Beng Kuan Tan. "Defeating SQL Injection." Computer 46, no. 3 (2013): 69–77. http://dx.doi.org/10.1109/mc.2012.283.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wrightes, Jene. "SQL injection attacks." Advances in Engineering Innovation 2, no. 1 (2023): 26–31. http://dx.doi.org/10.54254/2977-3903/2/2023017.

Full text
Abstract:
SQL Injection (SQLi) attacks continue to pose significant threats to modern web applications, compromising data integrity and confidentiality. This research delves into the development and evaluation of methodologies designed to detect and mitigate these malicious attacks. Employing a diverse set of web applications, the study unfolds in a controlled environment, simulating real-world conditions to assess the effectiveness of current defense mechanisms against SQLi. Building upon this baseline, the research introduces a two-pronged defense mechanism: a Static Analysis Tool to pre-emptively ide
APA, Harvard, Vancouver, ISO, and other styles
4

Nagpal, Bharti, Naresh Chauhan, and Nanhay Singh. "A Viable Solution to Prevent SQL Injection Attack Using SQL Injection." i-manager's Journal on Computer Science 3, no. 3 (2015): 5–10. http://dx.doi.org/10.26634/jcom.3.3.3660.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mr., Vishal Andodariya. "SQL Injection Attack Detection and Prevention Techniques to Secure Web Site." International Journal of Trend in Scientific Research and Development 2, no. 4 (2019): 624–28. https://doi.org/10.31142/ijtsrd13034.

Full text
Abstract:
Structured Query Language SQL Injection is a code injection technique that exploits security vulnerability occurring in database layer of web applications 8 . According to Open Web Application Security Projects OWASP , SQL Injection is one of top 10 web based attacks 10 . This paper shows the basics of SQL Injection attack, types of SQL Injection Attack according to their classification. It also describes the survey of different SQL Injection attack detection and prevention. At the end of this paper, the comparison of different SQL Injection Attack detection and prevention is shown. Mr. Vishal
APA, Harvard, Vancouver, ISO, and other styles
6

Kusuma, Gregorius Hendy. "Analysis of SQL Injection Attacks on Website Service." bit-Tech 1, no. 1 (2018): 26–33. http://dx.doi.org/10.32877/bt.v1i1.3.

Full text
Abstract:
Among the various types of software vulnerabilities, command injection is the most common type of threat in web applications. In command injection, SQL injection type of attacks areextremely prevalent, and ranked as the second most common form of attack on web. SQL injection attacks involve the construction of application’s input data that will result in the execution of malicious SQL statements. Most of the SQL injection detection techniques involve the code to be written along with the actual scripting code. These techniques do not detect errors in SQL statements. Hence, this paper proposes
APA, Harvard, Vancouver, ISO, and other styles
7

Mohd Yunus, Mohd Amin, Muhammad Zainulariff Brohan, Nazri Mohd Nawi, Ely Salwana Mat Surin, Nurhakimah Azwani Md Najib, and Chan Wei Liang. "Review of SQL Injection : Problems and Prevention." JOIV : International Journal on Informatics Visualization 2, no. 3-2 (2018): 215. http://dx.doi.org/10.30630/joiv.2.3-2.144.

Full text
Abstract:
SQL injection happened in electronic records in database and it is still exist even after two decades since it first happened. Most of the web-based applications are still vulnerable to the SQL injection attacks. Although technology had improved a lot during these past years, but, hackers still can find holes to perform the SQL injection. There are many methods for this SQL injection to be performed by the hackers and there is also plenty of prevention for the SQL injection to be happened. The vulnerability to SQL injection is very big and this is definitely a huge threat to the web based appl
APA, Harvard, Vancouver, ISO, and other styles
8

Dalai, Asish Kumar, and Sanjay Kumar Jena. "Neutralizing SQL Injection Attack Using Server Side Code Modification in Web Applications." Security and Communication Networks 2017 (2017): 1–12. http://dx.doi.org/10.1155/2017/3825373.

Full text
Abstract:
Reports on web application security risks show that SQL injection is the top most vulnerability. The journey of static to dynamic web pages leads to the use of database in web applications. Due to the lack of secure coding techniques, SQL injection vulnerability prevails in a large set of web applications. A successful SQL injection attack imposes a serious threat to the database, web application, and the entire web server. In this article, the authors have proposed a novel method for prevention of SQL injection attack. The classification of SQL injection attacks has been done based on the met
APA, Harvard, Vancouver, ISO, and other styles
9

Shalawati, Wa Ode Hardianas, Muh. Yamin, and Natalis Ransi. "IMPLEMENTASI TEKNOLOGI ENKRIPSI URL (UNIFORM RESOURCE LOCATOR) DAN LOGIN FORM MENGGUNAKAN ALGORITMA BLOWFISH UNTUK MENCEGAH SERANGAN SQL INJECTION." semanTIK 5, no. 2 (2019): 273–82. https://doi.org/10.5281/zenodo.3510178.

Full text
Abstract:
<em>Security of a website is a very important aspect.</em><em> Because unsafe websites will easily be damaged the integrity of the data and information through various attack</em><em>. SQL Injection is one type of attack that often occurs on websites. SQL Injection is a method for entering SQL commands as an input through a web to get database access. Insecure URLs and Login forms are often targeted by SQL Injection attacks to exploit web databases. There are many ways to prevent SQL Injection attacks and one of them uses cryptographic techniques to encrypt URLs and Login Forms of websites int
APA, Harvard, Vancouver, ISO, and other styles
10

JANG, Young-Su. "Detection of SQL Injection Vulnerability in Embedded SQL." IEICE Transactions on Information and Systems E103.D, no. 5 (2020): 1173–76. http://dx.doi.org/10.1587/transinf.2019edl8143.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

N, Asha, M. Varun Kumar, and Vaidhyanathan G. Vaidhyanathan.G. "Preventing SQL Injection Attacks." International Journal of Computer Applications 52, no. 13 (2012): 28–32. http://dx.doi.org/10.5120/8264-1809.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Smithu B S, Leela C P, and Nagashree N. "SQL injection vulnerability analysis." World Journal of Advanced Research and Reviews 9, no. 1 (2021): 312–18. https://doi.org/10.30574/wjarr.2021.9.1.0018.

Full text
Abstract:
Web applications are an integral part of today's digital landscape, serving various functions from e-commerce to social networking. However, they are also prime targets for cyber-attacks, with SQL-Injection vulnerabilities posing a significant threat to their security. This project addresses the critical issue of SQL-Injection vulnerabilities in web applications by offering a comprehensive analysis, leveraging Python and classical machine learning algorithms such as Naïve Bayes. The research method employed in this project involves procuring real-world datasets, conducting data pre-processing,
APA, Harvard, Vancouver, ISO, and other styles
13

B. Kalaiselvi, B. Kalaiselvi, Mannepalle Sai Chandu, Maridhu Narendra, and Mannepalle Deekshith Kumar. "SQL-Injection Vulnerability Scanning Tool for Automatic Creation of SQL-Injection Attacks." International Journal of Advances in Engineering and Management 7, no. 1 (2025): 577–87. https://doi.org/10.35629/5252-0701577587.

Full text
Abstract:
This research introduces an advanced automated scanning tool for detecting and analyzing SQL injection vulnerabilities in web applications, addressing the critical need for robust security testing mechanisms in modern web development. The proposed tool employs sophisticated dynamic analysis techniques combined with machine learning algorithms to automatically generate, execute, and validate SQL injection attack vectors. By implementing a multilayered detection approach, the system first identifies potential injection points through comprehensive input parameter analysis, followed by intelligen
APA, Harvard, Vancouver, ISO, and other styles
14

Bashah Mat Ali, Abdul, Ala’ Yaseen Ibrahim Shakhatreh, Mohd Syazwan Abdullah, and Jasem Alostad. "SQL-injection vulnerability scanning tool for automatic creation of SQL-injection attacks." Procedia Computer Science 3 (2011): 453–58. http://dx.doi.org/10.1016/j.procs.2010.12.076.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

S.S., Anandha Krishnan. "SQL Injection Detection Using Machine Learning." Revista Gestão Inovação e Tecnologias 11, no. 3 (2021): 300–310. http://dx.doi.org/10.47059/revistageintec.v11i3.1939.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Monica, Aprilia. "Pengukuran Efektivitas Serangan SQL Injection Pada Website Dengan Menggunakan Tools JSQL, Havij, Dan The Mole." Jurnal Informatika dan Teknologi Komputer ( J-ICOM) 4, no. 2 (2023): 65–71. https://doi.org/10.55377/j-icom.v4i2.6926.

Full text
Abstract:
Seiring perkembangan teknologi saat ini, keamanan terhadap informasi data yang berada di dalam website sangat rentan dengan kejahatan di dunia internet seperti serangan terhadap celah keamanan pada lapisan databases atau sering dikenal dengan istilah SQL Injection. Serangan SQL Injection merupakan metode untuk menyisipkan perintah SQL sebagai input melalui suatu aplikasi yaitu Kali Linux agar mendapatkan akses masuk ke dalam database. Serangan ini dapat mengetahui username, password, dan data lainnya yang berada di dalam database. Sehingga serangan SQL Injection merupakan salah satu serangan y
APA, Harvard, Vancouver, ISO, and other styles
17

ALAzzawi, Abdulbasit. "SQL Injection Detection Using RNN Deep Learning Model." Journal of Applied Engineering and Technological Science (JAETS) 5, no. 1 (2023): 531–41. http://dx.doi.org/10.37385/jaets.v5i1.2864.

Full text
Abstract:
SQL injection attacks are a common type of cyber-attack that exploit vulnerabilities in web applications to access databases through malicious SQL queries. These attacks pose a serious threat to the security and integrity of web applications and their data. The existing methods for detecting SQL injection attacks are based on predefined rules that can be easily circumvented by sophisticated attackers. Therefore, there is a need for a more robust and effective method for detecting SQL injection attacks. In this research, we propose a novel method for detecting SQL injection attacks using recurr
APA, Harvard, Vancouver, ISO, and other styles
18

Aburashed, Laila, Marah AL Amoush, and Wardeh Alrefai. "SQL Injection Attack Detection using Machine Learning Algorithms." Semarak International Journal of Machine Learning 2, no. 1 (2024): 1–12. http://dx.doi.org/10.37934/sijml.2.1.112.

Full text
Abstract:
SQL Injection is one of the most common vulnerabilities exploited for both privacy breaches and financial damage. It remains the top vulnerability on the most recent OWASP Top 10 list, with the number of such attacks on the rise. The SQL Injection Detection Challenge is addressed using machine learning algorithms. By employing a classification method, communications are identified as either SQL Injection or plain text. This research proposes a machine learning framework to assess the feasibility of using a machine learning classifier to detect SQL Injection attacks. Classification algorithms s
APA, Harvard, Vancouver, ISO, and other styles
19

Aburashed, Laila, Marah AL Amoush, and Wardeh Alrefai. "SQL Injection Attack Detection using Machine Learning Algorithms." Semarak International Journal of Machine Learning 2, no. 1 (2025): 1–12. https://doi.org/10.37934/sijml.2.1.112a.

Full text
Abstract:
SQL Injection is one of the most common vulnerabilities exploited for both privacy breaches and financial damage. It remains the top vulnerability on the most recent OWASP Top 10 list, with the number of such attacks on the rise. The SQL Injection Detection Challenge is addressed using machine learning algorithms. By employing a classification method, communications are identified as either SQL Injection or plain text. This research proposes a machine learning framework to assess the feasibility of using a machine learning classifier to detect SQL Injection attacks. Classification algorithms s
APA, Harvard, Vancouver, ISO, and other styles
20

Alghawazi, Maha, Daniyal Alghazzawi, and Suaad Alarifi. "Detection of SQL Injection Attack Using Machine Learning Techniques: A Systematic Literature Review." Journal of Cybersecurity and Privacy 2, no. 4 (2022): 764–77. http://dx.doi.org/10.3390/jcp2040039.

Full text
Abstract:
An SQL injection attack, usually occur when the attacker(s) modify, delete, read, and copy data from database servers and are among the most damaging of web application attacks. A successful SQL injection attack can affect all aspects of security, including confidentiality, integrity, and data availability. SQL (structured query language) is used to represent queries to database management systems. Detection and deterrence of SQL injection attacks, for which techniques from different areas can be applied to improve the detect ability of the attack, is not a new area of research but it is still
APA, Harvard, Vancouver, ISO, and other styles
21

Aprilia Monica Sari, Trihana Santhi, Dewa Ketut Alit Maha Putra, Muhamad Bintang Haekal, I Made Edy Listartha, and Gede Arna Jude Saskara. "PENGUKURAN EFEKTIVITAS SERANGAN SQL INJECTION PADA WEBSITE DENGAN MENGGUNAKAN TOOLS JSQL, HAVIJ, DAN THE MOLE." Jurnal Informatika Dan Tekonologi Komputer (JITEK) 3, no. 1 (2023): 35–42. http://dx.doi.org/10.55606/jitek.v3i1.905.

Full text
Abstract:
Along with current technological developments, security for data information residing on websites is very vulnerable to crimes in the internet world such as attacks on security holes in the database layer or often known as SQL Injection. SQL Injection attack is a method to insert SQL commands as input through an application, namely Kali Linux, in order to gain access to the database. This attack can find out usernames, passwords, and other data that is in the database. So that the SQL Injection attack is one of the most popular attacks and is often used to take advantage of security holes in t
APA, Harvard, Vancouver, ISO, and other styles
22

K.Kolhe, Abhay, and Pratik Adhikari. "Injection, Detection, Prevention of SQL Injection Attacks." International Journal of Computer Applications 87, no. 7 (2014): 40–43. http://dx.doi.org/10.5120/15224-3739.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Et. al., Leelavathy S,. "A Secure Methodology to Detect and Prevent Ddos and Sql Injection Attacks." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (2021): 341–46. http://dx.doi.org/10.17762/turcomat.v12i2.722.

Full text
Abstract:
As most of the applications host on cloud, Security is a major concern for the data owners. The cloud environment has to be secure and protect data owner data from cloud attacks. In this project work, we study about securing firewall against client side attacks namely Denial of firewall and SQL injection attacks. Denial of firewall is nothing but overloading the firewall by bursting n number of requests through vulnerable scripts. SQL injection attack is defined as bypassing the security protocols by malicious scripts. Thus we proposed to design and develop a web application to detect and prev
APA, Harvard, Vancouver, ISO, and other styles
24

Chen, Zhuang, Min Guo, and Lin zhou. "Research on SQL injection detection technology based on SVM." MATEC Web of Conferences 173 (2018): 01004. http://dx.doi.org/10.1051/matecconf/201817301004.

Full text
Abstract:
SQL injection, which has the characteristics of great harm and fast variation, has always ranked the top of the OWASP TOP 10, which has always been a hot spot in the research of web security. In view of the difficulty of detecting unknown attacks by the existing rule matching method, a method of SQL injection detection based on machine learning is proposed. And the author analyses the method of SQL injection feature extraction, f Finally, the word2vec method is selected to process the text data of the HTTP request, which can effectively represent the SQL injection features containing the attac
APA, Harvard, Vancouver, ISO, and other styles
25

Fahmi Al Azhar, Muhammad, and Ruki Harwahyu. "DETECTION OF SQL INJECTION VULNERABILITY IN CODEIGNITER FRAMEWORK USING STATIC ANALYSIS." MULTITEK INDONESIA 17, no. 1 (2023): 69–78. http://dx.doi.org/10.24269/mtkind.v17i1.7267.

Full text
Abstract:
SQL Injection attacks are still one type of attack that often occurs in web-based applications. The causes and ways to prevent SQL Injection have been widely explained in various sources. Unfortunately, until now, SQL Injection vulnerabilities are still often found in multiple applications. Web-based application frameworks that already have functions to protect against attacks are often not used optimally. This is inseparable from the role of programmers, who often forget the rules for writing program code to prevent SQL Injection attacks. We conducted this research to detect SQL Injection vul
APA, Harvard, Vancouver, ISO, and other styles
26

Parameswari, S., and K. Kavitha. "SQL Injection Attack on Web Application." Asian Journal of Computer Science and Technology 7, S1 (2018): 11–15. http://dx.doi.org/10.51983/ajcst-2018.7.s1.1814.

Full text
Abstract:
SQL injection attacks are one of the highest dangers for applications composed for the Web. These attacks are dispatched through uncommonly made client information on web applications that utilizes low level string operations to build SQL queries. An SQL injection weakness permits an assailant to stream summons straightforwardly to a web application’s hidden database and annihilate usefulness or privacy. In this paper we proposed a simplified algorithm which works on the basic features of the SQL Injection attacks and will successfully detect almost all types of SQL Injection attacks. In the p
APA, Harvard, Vancouver, ISO, and other styles
27

Sarajaldeen Akram Bahjat Arif. "The Theoretical Foundations and Literature Analysis a Hybrid Detection Technique Against Malicious SQL Attacks on Web Applications." Journal of Information Systems Engineering and Management 10, no. 35s (2025): 1093–100. https://doi.org/10.52783/jisem.v10i35s.6218.

Full text
Abstract:
Today, most web applications are vulnerable to SQL-injection attacks. Malicious inputs by unauthorized attackers can cause the deletion, modification, or retrieval of confidential data from remote databases, creating huge financial losses and affecting the operations of commercial vendors and financial companies. Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user inputs in web applications associated with remote server databases and to develop a new method based on dynamic detection techniques to prevent SQL injection attacks. The methodology is ba
APA, Harvard, Vancouver, ISO, and other styles
28

Gusti Ayu Mas Ekayanti, Dewa Ayu Deby Cintiya, Putu Yoga Suartana, Rama Ngurah Putera Pinatih, Gede Arna Jude Saskara, and I Made Edy Listartha. "PERBANDINGAN TOOLS SQL SUS, SQL NINJA, DAN THE MOLE DALAM PENERAPAN SQL INJECTION." Jurnal Informatika Teknologi dan Sains 4, no. 4 (2022): 478–82. http://dx.doi.org/10.51401/jinteks.v4i4.2201.

Full text
Abstract:
In this modern era, the rapid development of science and technology is certainly very beneficial for human life. However, this development can also bring threats, such as cyber attacks. One type of cyber attack that is often used is SQL injection, which targets database security. Three tools that can be used in testing SQL injection are SQL sus, SQL ninja, and The mole. Testing these three tools uses two operating systems, that is Kali Linux and Windows. The test results are measured based on several parameters, namely, the speed of the tool in responding to commands, the number of stages in i
APA, Harvard, Vancouver, ISO, and other styles
29

Chauhan, C. U., Kunal Wadhai,, Rohan Raut,, Shriram Raut,, Aditya Nikode, and Vaibhav Pachbhai,. "Network Intrusion Detection System for SQL Injection." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem43662.

Full text
Abstract:
SQL injection (SQL) attacks pose a serious threat to web applications by allowing attackers to manipulate database queries and gain unauthorized access to sensitive data. Traditional security mechanisms, such as signature-based detection and rule-based firewalls, often fail to detect evolving SQL patterns. This paper presents a real-time Network Intrusion Detection System (NIDS) that leverages machine learning techniques to accurately identify and mitigate SQL injection attempts. The proposed system continuously monitors user input, extracts relevant SQL query features, and classifies them as
APA, Harvard, Vancouver, ISO, and other styles
30

Hafriadi, Fajar Dzulnufrie, and Rizka Ardiansyah. "NETWORK'S ACCESS LOG CLASSIFICATION FOR DETECTING SQL INJECTION ATTACKS WITH THE LSTM ALGORITHM." Jurnal Teknik Informatika (Jutif) 5, no. 4 (2024): 745–52. https://doi.org/10.52436/1.jutif.2024.5.4.2157.

Full text
Abstract:
SQL Injection attacks are one of the popular web attacks. This attack is a network security problem focused on the application layer which is one of the causes of a large number of user data leaks. Currently available SQL detection techniques mostly rely on manually created features. Generally, the detection results of SQL Injection attacks depend on the accuracy of feature extraction, so they cannot overcome increasingly complex SQL Injection attacks on various systems. Responding to these problems, this research proposes a SQL Injection attack detection method using the long short term memor
APA, Harvard, Vancouver, ISO, and other styles
31

Jesennia, Iñiguez Banegas, Guamán Quinché Rene, Figueroa Diaz Robert, and Ajila Zaquinaula Freddy. "Systematic Literature Review: SQL Injection in Web Applications." Latin-American Journal of Computing 3, no. 2 (2016): 65–72. https://doi.org/10.5281/zenodo.5750713.

Full text
Abstract:
SQL injection is a security vulnerability that affects web applications. This occurs when a SQL (malicious code) query is inserted through the inputs of a client interface allowing you to read and modify information. This article details the process of systematic review of literature on primary studies that raise proposals and solution about SQL injection. Barbara Kitchenham proposed protocol was followed and a total of 9&nbsp;studies of various journals and conferences was reviewed. Research on SQL injections is still an open issue, it has been&nbsp;obtained proposals for the prevention and d
APA, Harvard, Vancouver, ISO, and other styles
32

Halib, Badaruddin Bin, Edy Budiman, and Hario Jati Setyadi. "Teknik Hacking Web Server Dengan Sqlmap Di Kali Linux." Jurnal Rekayasa Teknologi Informasi (JURTI) 1, no. 1 (2017): 67. http://dx.doi.org/10.30872/jurti.v1i1.642.

Full text
Abstract:
SQL Injection merupakan sebuah teknik hacking dimana seorang penyerang dapat memasukkan perintah-perintah SQL melalui URL untuk dieksekusi oleh database. Berdasarkan data dari Akamai Q2 pada tahun 2016, teknik SQL Injection adalah bug yang kedua paling banyak ditemukan di pada web server yang berada di Internet yaitu sekitar 44.11%. Penelitian ini bertujuan untuk: 1) Menguji keamanan web server Perguruan Tinggi, Pemerintahan dan web server Luar Negeri apakah vulnerable terhadap SQL Injection, 2) Membantu administrator memeriksa suatu web server yang vulnerable terhadap SQL Injection secara cep
APA, Harvard, Vancouver, ISO, and other styles
33

Abebe, Anduamlak, Yonas Belay, Adane Belay, and Seffi Gebeyehu. "SQL INJECTION ATTACKS DETECTION: A PERFORMANCE COMPARISON ON MULTIPLE CLASSIFICATION MODELS." Ethiopian International Journal of Engineering and Technology 2, no. 1 (2024): 22–38. http://dx.doi.org/10.59122/154cfc15.

Full text
Abstract:
SQL injection attacks are a common and serious security threat to web applications, where malicious users exploit vulnerabilities to gain unauthorized access to sensitive data or manipulate the database. Detecting and preventing SQL injection attacks is crucial for ensuring the security and integrity of web applications. While there have been studies on using machine learning for detecting SQL injection attacks, there is a lack of comprehensive comparative analysis that evaluates the performance of multiple classification models specifically for this purpose. Existing research often focuses on
APA, Harvard, Vancouver, ISO, and other styles
34

Alanda, Alde, Deni Satria, M. Isthofa Ardhana, Andi Ahmad Dahlan, and Hanriyawan Adnan Mooduto. "Web Application Penetration Testing Using SQL Injection Attack." JOIV : International Journal on Informatics Visualization 5, no. 3 (2021): 320. http://dx.doi.org/10.30630/joiv.5.3.470.

Full text
Abstract:
A web application is a very important requirement in the information and digitalization era. With the increasing use of the internet and the growing number of web applications, every web application requires an adequate security level to store information safely and avoid cyber attacks. Web applications go through rapid development phases with short turnaround times, challenging to eliminate vulnerabilities. The vulnerability on the web application can be analyzed using the penetration testing method. This research uses penetration testing with the black-box method to test web application secu
APA, Harvard, Vancouver, ISO, and other styles
35

Senouci, Oussama, and Nadjib Benaouda. "Advanced deep learning framework for detecting SQL injection attacks based on GRU Model." STUDIES IN ENGINEERING AND EXACT SCIENCES 5, no. 2 (2024): e11299. https://doi.org/10.54021/seesv5n2-596.

Full text
Abstract:
SQL injection attacks are a major danger to data security in application systems, leveraging weaknesses to illicitly access and change sensitive data. Traditional detection methods, such rule-based systems and supervised machine learning, struggle to adapt to new SQL injection attack strategies. This study presents an Enhanced Deep Learning Framework for SQL Injection Detection utilizing the Gated Recurrent Unit (GRU) model to overcome constraints. To discover new attack patterns, the proposed framework uses a dynamic learning process instead of static detection methods. By examining SQL query
APA, Harvard, Vancouver, ISO, and other styles
36

Kartheek, Pamarthi. "Artificial Intelligence and Machine Learning Techniques to Control SQL Injection Attacks." Journal of Scientific and Engineering Research 7, no. 4 (2020): 259–67. https://doi.org/10.5281/zenodo.13348395.

Full text
Abstract:
In the current the environment, each and every one of us is dependent on web applications. Every single day, the number of people who utilise online applications continues to increase. Databases are utilised by the majority of organisations in order to save information regarding their users or any details regarding the services that they offer. Database communication is a common application of Structured Query Language (SQL). In a SQL Injection attack, the hacker obtains access to the database by inserting malicious SQL statements into the database. Database security is at risk from SQL inject
APA, Harvard, Vancouver, ISO, and other styles
37

Supartini, Reni, and Jumadi Mabe Parenreng. "Deteksi Serangan SQL Injection pada Website dengan Menggunakan Metode Reguler Expression." Progressive Information, Security, Computer, and Embedded System 1, no. 2 (2023): 107–14. http://dx.doi.org/10.61255/pisces.v1i2.101.

Full text
Abstract:
Seiring perkembangan teknologi saat ini, keamanan terhadap informasi data yang berada di dalam website sangat rentan dengan kejahatan di dunia internet seperti serangan terhadap celah keamanan pada lapisan databases atau sering dikenal dengan istilah SQL Injection. Serangan SQL Injection merupakan metode untuk menyisipkan perintah SQL sebagai input melalui suatu aplikasi agar mendapatkan akses masuk ke dalam database. Serangan ini dapat mengetahui username, password, dan data lainnya yang berada di dalam database. Sehingga serangan SQL Injection merupakan salah satu serangan yang popular dan s
APA, Harvard, Vancouver, ISO, and other styles
38

Sheng, Jingyuan. "Research on SQL Injection Attack and Defense Technology of Power Dispatching Data Network: Based on Data Mining." Mobile Information Systems 2022 (July 30, 2022): 1–8. http://dx.doi.org/10.1155/2022/6207275.

Full text
Abstract:
In the process of SQL injection attack and defense of power dispatching data network, in order to ensure the accuracy of identification and defense, it is often necessary to build a rule base. However, the scale of the temporarily constructed rule base is limited, which is easy to cause false positives and omissions. Based on the traditional defense, data mining technology is introduced to design a SQL injection attack and defense technology for power dispatching data network. First, the SQL injection attack is analyzed, and the attack flow diagram is obtained as the basis of attack identifica
APA, Harvard, Vancouver, ISO, and other styles
39

Ochieng Okello, Fredrick. "A STUDY OF MACHINE LEARNING-BASED APPROACHES FOR SQL INJECTION DETECTION AND PREVENTION." International Journal of Advanced Research 13, no. 02 (2025): 1035–44. https://doi.org/10.21474/ijar01/20461.

Full text
Abstract:
SQL injection (SQLi) attacks remain one of the most prevalent and critical security threats to web applications, often leading to data breaches, unauthorized access, and system compromise. This study explores the effectiveness of various machine learning (ML) algorithms in detecting and preventing SQL injection attacks, including Support Vector Machines (SVM), Decision Trees, Random Forest, Neural Networks, and Ensemble Learning models. Through an extensive analysis of different publicly available datasets and comparison of model performance, it is observed that advanced ML algorithms, such as
APA, Harvard, Vancouver, ISO, and other styles
40

Pawar, Abhishek, Nikita Kapadnis, Pallavi Joshi, Vishwjeet Kalyankar, Raj Gharat, and Vedant Khokle. "Detecting Data Leaks due to SQL Injection." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–7. https://doi.org/10.55041/ijsrem39512.

Full text
Abstract:
Abstract—SQL injection is a prevalent web application vulner- ability that allows attackers to manipulate database queries, often leading to severe data leaks. This paper surveys existing research on SQL injection attacks and various detection and prevention techniques. We explore classical and modern approaches, includ- ing machine learning paradigms, input verification methods, and parameterized query techniques. By examining the strengths and weaknesses of these approaches, this paper proposes a compre- hensive prevention framework. The challenges, limitations, and future directions for enh
APA, Harvard, Vancouver, ISO, and other styles
41

Mane, Sulakshana B., Kiran Shrimant Kakade, S. P. Shingare, and Nanasaheb M. Halgare. "SQL injection authentication security threat." International Journal of Electronic Security and Digital Forensics 16, no. 4 (2024): 474–85. http://dx.doi.org/10.1504/ijesdf.2024.139661.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Ullrich, Johannes B., and Jason Lam. "Defacing websites via SQL injection." Network Security 2008, no. 1 (2008): 9–10. http://dx.doi.org/10.1016/s1353-4858(08)70007-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Alenezi, Mamdouh, Muhammad Nadeem, and Raja Asif. "SQL injection attacks countermeasures assessments." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 2 (2021): 1121. http://dx.doi.org/10.11591/ijeecs.v21.i2.pp1121-1131.

Full text
Abstract:
&lt;span&gt;SQL injections attacks have been rated as the most dangerous vulnerability of web-based systems over more than a decade by OWASP top ten. Though different static, runtime and hybrid approaches have been proposed to counter SQL injection attacks, no single approach guarantees flawless prevention/ detection for these attacks. Hundreds of components of open source and commercial software products are reported to be vulnerable for SQL injection to CVE repository every year. In this mapping study, we identify different existing approaches in terms of the cost of computation and protecti
APA, Harvard, Vancouver, ISO, and other styles
44

Dora, Jean Rosemond, Ladislav Hluchý, and Karol Nemoga. "Ontology for Blind SQL Injection." Computing and Informatics 42, no. 2 (2023): 480–500. http://dx.doi.org/10.31577/cai_2023_2_480.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Alenezi, Mamdouh, Muhammad Nadeem, and Raja Asif. "SQL injection attacks countermeasures assessments." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 2 (2021): 1121–31. https://doi.org/10.11591/ijeecs.v21.i2.pp1121-1131.

Full text
Abstract:
SQL injections attacks have been rated as the most dangerous vulnerability of web-based systems over more than a decade by OWASP top ten. Though different static, runtime and hybrid approaches have been proposed to counter SQL injection attacks, no single approach guarantees flawless prevention/ detection for these attacks. Hundreds of components of open source and commercial software products are reported to be vulnerable for SQL injection to CVE repository every year. In this mapping study, we identify different existing approaches in terms of the cost of computation and protection offered.
APA, Harvard, Vancouver, ISO, and other styles
46

Bastos, Rafael Rodrigues, and Felipe Boeira de Magalhães. "SQL Injection: Entendendo e evitando." Cuadernos de Educación y Desarrollo 17, no. 3 (2025): e7856. https://doi.org/10.55905/cuadv17n3-107.

Full text
Abstract:
Este artigo explora o SQL Injection, um ataque que compromete a segurança de sistemas ao permitir a manipulação indevida de consultas SQL. A vulnerabilidade ocorre quando entradas de usuários não são devidamente tratadas, possibilitando a execução de comandos maliciosos no banco de dados. Para mitigar esse risco, são abordadas três estratégias: criptografia de dados, validação de entradas e o uso do PHP Data Objects (PDO). A criptografia protege informações ao transformá-las em formatos ilegíveis sem a chave correta. A validação de entradas impede caracteres perigosos por meio de listas de per
APA, Harvard, Vancouver, ISO, and other styles
47

Selvi, M., M. Maheswari, A. Christy, Theresa M. Mercy, A. Jesudoss, and V. Ulagamuthalvi. "Analysis and implementation of SQL injection attack and countermeasures using SQL injection prevention techniques." International Journal of Engineering Systems Modelling and Simulation 1, no. 1 (2022): 1. http://dx.doi.org/10.1504/ijesms.2022.10045315.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Jesudoss, A., Theresa M. Mercy, A. Christy, M. Maheswari, M. Selvi, and V. Ulagamuthalvi. "Analysis and implementation of SQL injection attack and countermeasures using SQL injection prevention techniques." International Journal of Engineering Systems Modelling and Simulation 13, no. 4 (2022): 262. http://dx.doi.org/10.1504/ijesms.2022.126305.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Natarajan, Kanchana, and Sarala Subramani. "Generation of Sql-injection Free Secure Algorithm to Detect and Prevent Sql-Injection Attacks." Procedia Technology 4 (2012): 790–96. http://dx.doi.org/10.1016/j.protcy.2012.05.129.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Mahrouqi, A., P. Tobin, S. Abdalla, and T. Kechadi. "Simulating SQL-Injection Cyber-Attacks Using GNS3." International Journal of Computer Theory and Engineering 8, no. 3 (2016): 213–17. http://dx.doi.org/10.7763/ijcte.2016.v8.1046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!