Balasundram et al., 2013 - Google Patents
Prevention of SQL Injection attacks by using service oriented authentication techniqueBalasundram et al., 2013
View PDF- Document ID
- 4107923822671944869
- Author
- Balasundram I
- Ramaraj E
- Publication year
- Publication venue
- International Journal of modeling and optimization
External Links
Snippet
Web applications have become steadily increased in daily routines activities and continue to integrate them. On-line reservations, paying bills and on-line shopping expect these web applications to be secure and reliable; the fear of SQL–Injection Attacks has become …
- 238000000034 method 0 title abstract description 42
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Fredj et al. | An OWASP top ten driven survey on web application protection methods | |
Wei et al. | Preventing SQL injection attacks in stored procedures | |
Stuttard et al. | The web application hacker's handbook: Finding and exploiting security flaws | |
Li et al. | A survey on server-side approaches to securing web applications | |
Nguyen-Tuong et al. | Automatically hardening web applications using precise tainting | |
Yeole et al. | Analysis of different technique for detection of SQL injection | |
Deepa et al. | Black-box detection of XQuery injection and parameter tampering vulnerabilities in web applications | |
Sheykhkanloo | SQL-IDS: evaluation of SQLi attack detection and classification based on machine learning techniques | |
Kausar et al. | SQL injection detection and prevention techniques in ASP .NET web application | |
Sharma et al. | SQL injection attacks-a systematic review | |
Bhateja et al. | A review of sql injection attack and various detection approaches | |
Dharam et al. | Runtime monitoring technique to handle tautology based SQL injection attacks | |
Aich | Secure query processing by blocking sql injection | |
Hammoudeh et al. | The study on assessment of security web applications | |
Balasundram et al. | Prevention of SQL Injection attacks by using service oriented authentication technique | |
Dharam et al. | Runtime monitoring framework for SQL injection attacks | |
Gomaa et al. | Survey on securing a querying process by blocking SQL injection | |
Dwivedi et al. | Web application vulnerabilities: A survey | |
Sheykhkanloo | A Pattern Recognition Neural Network Model for Detection and Classification of SQL Injection Attacks | |
Nunes | Blended security analysis for web applications: Techniques and tools | |
Indrani et al. | X–log authentication technique to prevent sql injection attacks | |
Pathan et al. | Lethality of SQL injection against current and future internet technologies | |
Ingle et al. | Attacks on web based software and modelling defence mechanisms | |
GUPTA et al. | Web Security against SQL Injection Attack | |
Loughran et al. | All about SQL injection attacks |