SQL Injection Impact on Web Server and Their Risk Mitigation Policy Implementation Techniques: An Ultimate solution to Prevent Computer Network from Illegal Intrusion
Na minha lista:
| Publicado no: | International Journal of Advanced Research in Computer Science vol. 8, no. 3 (Mar 2017), p. n/a |
|---|---|
| Autor principal: | |
| Outros Autores: | |
| Publicado em: |
International Journal of Advanced Research in Computer Science
|
| Assuntos: | |
| Acesso em linha: | Citation/Abstract Full Text - PDF |
| Tags: |
Sem tags, seja o primeiro a adicionar uma tag!
|
MARC
| LEADER | 00000nab a2200000uu 4500 | ||
|---|---|---|---|
| 001 | 1901457619 | ||
| 003 | UK-CbPIL | ||
| 022 | |a 0976-5697 | ||
| 035 | |a 1901457619 | ||
| 045 | 2 | |b d20170301 |b d20170331 | |
| 084 | |a 198728 |2 nlm | ||
| 100 | 1 | |a Sadotra, Parveen | |
| 245 | 1 | |a SQL Injection Impact on Web Server and Their Risk Mitigation Policy Implementation Techniques: An Ultimate solution to Prevent Computer Network from Illegal Intrusion | |
| 260 | |b International Journal of Advanced Research in Computer Science |c Mar 2017 | ||
| 513 | |a Journal Article | ||
| 520 | 3 | |a SQL Injection attacks pose a very serious security threat to Web applications and web servers. They allow attackers to obtain unrestricted access to the databases underlying the applications and to the potentially sensitive and important information these databases contain. Although researchers and security professionals have proposed various methods to address the SQL injection problem but current approaches either fail to address the full scope of the problem or have limitations that prevent their use and adoption. Many researchers and security professionals are familiar with only a subset of the wide range of techniques available to attackers who are trying to take advantage of SQL injection vulnerabilities. As a result, many solutions proposed in the literature address only some of the issues related to SQL injection. To address this problem, we are presenting an extensive review of the different types of SQL injection attacks known to date. Also for each type of attack, we provide descriptions and examples of how attacks of that type could be performed. We also presented and analyze existing detection and prevention techniques against SQL injection attacks. | |
| 653 | |a Researchers | ||
| 653 | |a Intrusion | ||
| 653 | |a Security management | ||
| 653 | |a Applications programs | ||
| 653 | |a Computer networks | ||
| 653 | |a Query languages | ||
| 653 | |a Databases | ||
| 653 | |a Servers | ||
| 653 | |a Cybersecurity | ||
| 700 | 1 | |a Sharma, Chandrakant | |
| 773 | 0 | |t International Journal of Advanced Research in Computer Science |g vol. 8, no. 3 (Mar 2017), p. n/a | |
| 786 | 0 | |d ProQuest |t Advanced Technologies & Aerospace Database | |
| 856 | 4 | 1 | |3 Citation/Abstract |u https://www.proquest.com/docview/1901457619/abstract/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text - PDF |u https://www.proquest.com/docview/1901457619/fulltextPDF/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch |