Detection and prevention for SQL injection attacks in stored procedures using real time web application
At present, web applications have been used for most of our activities in our life. Web applications are affected by the attacks of SQL injection. SQL injection is a prevalent technique that attackers appoint to impose the database in the most of web applications, by manipulate the SQL queries that...
| Auteur principal: | Salih Ali, Nabeel |
|---|---|
| Format: | Thèse |
| Langue: | anglais anglais |
| Publié: |
2015
|
| Sujets: | |
| Accès en ligne: | http://eprints.utem.edu.my/id/eprint/15891/1/DETECTION%20AND%20PREVENTION%20FOR%20SQL%20INJECTION%20ATTACKS%20IN%20STORED%20PROCEDURES%20USING%20REAL%20TIME%20WEB%20APPLICATION%20%2824%20pgs%29.pdf http://eprints.utem.edu.my/id/eprint/15891/2/Detection%20and%20prevention%20for%20SQL%20injection%20attacks%20in%20stored%20procedures%20using%20real%20time%20web%20application.pdf |
Documents similaires
Preventing MS SQL Injection in Web Application
par: Khader, Aqeel Sahi
Publié: (2010)
par: Khader, Aqeel Sahi
Publié: (2010)
SQL-Injection Vulnerability Scanner Using Automatic Creation of SQL-Injection Attacks (MySqlinjector)
par: Shakhatreh, Ala' Yaseen Ibrahim
Publié: (2010)
par: Shakhatreh, Ala' Yaseen Ibrahim
Publié: (2010)
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
par: Draib, Najla'a Ateeq Mohammed
Publié: (2022)
par: Draib, Najla'a Ateeq Mohammed
Publié: (2022)
Hybrid detection for databases using SQL injection and insider misuse detection techniques
par: Asmawi, Aziah
Publié: (2010)
par: Asmawi, Aziah
Publié: (2010)
Logical operators and its application in determining vulnerable websites caused by SQL injection among UTM faculty websites
par: Mokhter, Nurul Fariha
Publié: (2013)
par: Mokhter, Nurul Fariha
Publié: (2013)
An improved SQL injection detection model in signature based IDS using tree structure
par: Sadeghian, Amirmohammad
Publié: (2014)
par: Sadeghian, Amirmohammad
Publié: (2014)
A study towards initial work in developing a framework for SQL injection detection tools evaluation
par: Tajpour, Atefeh
Publié: (2010)
par: Tajpour, Atefeh
Publié: (2010)
Effectiveness of structured query language injection attacks detection mechanisms
par: Mohamad, Nurul Zawiyah
Publié: (2008)
par: Mohamad, Nurul Zawiyah
Publié: (2008)
Performance analysis on detection and prevention of wormhole attack in wireless network
par: Apandi, Mohamad Aiman Hanif
Publié: (2019)
par: Apandi, Mohamad Aiman Hanif
Publié: (2019)
SQL Performance : Guideline for Tuning the SQL Queries in Oracle RDBMS
par: Nor'azah, Md. Khushairi
Publié: (2005)
par: Nor'azah, Md. Khushairi
Publié: (2005)
Real-time denial of service attack detection and mitigation on controller in software defined network environment / Bilal Ishfaq
par: Bilal , Ishfaq
Publié: (2016)
par: Bilal , Ishfaq
Publié: (2016)
Analysis of web worm attack on web application
par: Mohd. Ghazzali, Amalina
Publié: (2008)
par: Mohd. Ghazzali, Amalina
Publié: (2008)
Semiparametric inference procedure for the accelarated failure time model with interval-censored data
par: Karimi, Mostafa
Publié: (2019)
par: Karimi, Mostafa
Publié: (2019)
Identifying Test Cases for Stored Procedure Using Cyclomatic Complexity Approach
par: Rosmah, Ismail
Publié: (2009)
par: Rosmah, Ismail
Publié: (2009)
Some Modification on Interval Symmetric Single-Step Procedure for Simultaneous Inclusion of Real Zzeros of Polynomials
par: Mohammad Rusli, Syaida Fadhilah
Publié: (2011)
par: Mohammad Rusli, Syaida Fadhilah
Publié: (2011)
Securing passive optical network against signal injection attack
par: Al-Hinai, Salim Mohammed Abdullah
Publié: (2019)
par: Al-Hinai, Salim Mohammed Abdullah
Publié: (2019)
Development of a technique for real-time leakage detection and location in water distribution networks
par: Aburawe, Salah Muamer
Publié: (2014)
par: Aburawe, Salah Muamer
Publié: (2014)
Delay and extension of time: the real issue in conflicts between time-bar provisions and prevention principle
par: Mohd. Zin, Hamim
Publié: (2013)
par: Mohd. Zin, Hamim
Publié: (2013)
A novel secure mud-based real time intrusion detection and prevention mechanism for IoT network / Noman Mazhar
par: Noman , Mazhar
Publié: (2023)
par: Noman , Mazhar
Publié: (2023)
The deadline-based scheduling of divisible real-time workloads on multiprocessor platforms
par: Chuprat, Suriayati
Publié: (2009)
par: Chuprat, Suriayati
Publié: (2009)
Detection and prevention of malicious of relational database management systems (RDBMS)
par: Mohammed Rashad Aldhoqm, Arafat
Publié: (2013)
par: Mohammed Rashad Aldhoqm, Arafat
Publié: (2013)
Improved robust estimator and clustering procedures for multivariate outliers detection
par: Sharifah Sakinah, Syed Abd Mutalib
Publié: (2023)
par: Sharifah Sakinah, Syed Abd Mutalib
Publié: (2023)
Real-time avatar sweating simulation using texture based and particle system
par: Qasim, Ahmed Zuhair
Publié: (2013)
par: Qasim, Ahmed Zuhair
Publié: (2013)
Real Time Tracking and Face Recognition Using Web Camera
par: Thirunavakkarasu, Punithavathi
Publié: (2005)
par: Thirunavakkarasu, Punithavathi
Publié: (2005)
Web application scanning for malware attack detection with provide appropriate incident report by using hybrid method
par: Abdul Razak, Aina Nabila
Publié: (2019)
par: Abdul Razak, Aina Nabila
Publié: (2019)
Reduced Fuzzy Recursive Least-Squares Algorithm For Real
Time Estimation
par: Cheah, Kah Wai
Publié: (2018)
par: Cheah, Kah Wai
Publié: (2018)
Verification the performance of Microsoft SQL Server / Nageswary Gannapathy
par: Nageswary , Gannapathy
Publié: (2002)
par: Nageswary , Gannapathy
Publié: (2002)
Real-time power quality detection and classification system
par: Abidullah, Noor Athira
Publié: (2015)
par: Abidullah, Noor Athira
Publié: (2015)
A web-based application for ladies shopping store / Alice Aegidius Sitiol
par: Alice Aegidius , Sitiol
Publié: (2000)
par: Alice Aegidius , Sitiol
Publié: (2000)
Prevention Mechanism Against Denial Of Service Attack On Duplicate Address Detection Process In Ipv6 Link-Local Networks
par: Ibrahim Al-Ani, Ahmed Khallel
Publié: (2020)
par: Ibrahim Al-Ani, Ahmed Khallel
Publié: (2020)
Hybrid laplace transform solution for coupled partial differential equation of fumigant transport in stored grain
par: Lukunti, Salisu
Publié: (2019)
par: Lukunti, Salisu
Publié: (2019)
Forward scattering radar for real-time detection of human activities and fall classification
par: Abdulhameed, Ali Ahmed
Publié: (2019)
par: Abdulhameed, Ali Ahmed
Publié: (2019)
A simultaneous spam and phishing attack detection framework for short message service based on text mining approach
par: Mohd Foozy, Cik Feresa
Publié: (2017)
par: Mohd Foozy, Cik Feresa
Publié: (2017)
On the prevention of Cross-VM cache-based side channel attacks / Zakira Inayat
par: Zakira, Inayat
Publié: (2017)
par: Zakira, Inayat
Publié: (2017)
Effective preventive maintenance planning procedures for continuously operating power generation equipment and systems
par: Ali Hassan, Ibrahim Moallim
Publié: (1995)
par: Ali Hassan, Ibrahim Moallim
Publié: (1995)
Real-Time Capable Multi-Hop Media Access Control Protocol For Smart Home Environment
par: M.Shukeri, Nurulfaizal
Publié: (2017)
par: M.Shukeri, Nurulfaizal
Publié: (2017)
A Study On The Relationship Between
Store Image, Store Satisfaction
And Store Loyalty
par: Gondasamy, Shamila Rani
Publié: (2006)
par: Gondasamy, Shamila Rani
Publié: (2006)
A Study On The Relationship Between Store Image, Store Satisfaction And Store Loyalty
par: Gondasamy, Shamila Rani
Publié: (2006)
par: Gondasamy, Shamila Rani
Publié: (2006)
A Study On The Relationship Between Store Image, Store Satisfaction And Store Loyalty
par: Gondasamy, Shamila Rani
Publié: (2006)
par: Gondasamy, Shamila Rani
Publié: (2006)
Denial of service bandwidth attack detection
par: Chong, Foo Keong
Publié: (2002)
par: Chong, Foo Keong
Publié: (2002)
Documents similaires
-
Preventing MS SQL Injection in Web Application
par: Khader, Aqeel Sahi
Publié: (2010) -
SQL-Injection Vulnerability Scanner Using Automatic Creation of SQL-Injection Attacks (MySqlinjector)
par: Shakhatreh, Ala' Yaseen Ibrahim
Publié: (2010) -
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
par: Draib, Najla'a Ateeq Mohammed
Publié: (2022) -
Hybrid detection for databases using SQL injection and insider misuse detection techniques
par: Asmawi, Aziah
Publié: (2010) -
Logical operators and its application in determining vulnerable websites caused by SQL injection among UTM faculty websites
par: Mokhter, Nurul Fariha
Publié: (2013)