Hybrid method integrating SQL-IF and Naïve Bayes for SQL injection attack avoidance
نویسندگان
چکیده
منابع مشابه
A Study on Disclosure and Avoidance of SQL Injection Attack
Many software systems include a web-based element that makes them available to the public via the internet and can expose them to a variety of web-based attacks. One of these attacks is SQL injection which can give attackers illegal access to the databases. This paper presents a way to prevent web applications against SQL injection. Pattern matching is a system that can be used to distinguish o...
متن کاملDetection and Prevention of SQL Injection attack
SQL injection is a technique where the attacker injects an input in the query in order to change the structure of the query intended by the programmer and gaining the access of the database which results modification or deletion of the user’s data. In the injection it exploits a security vulnerability occurring in database layer of an application. SQL injection attack is the most common attack ...
متن کاملTampering THE SQL code INJECTION attack
− As Internet Telephony and Voice over IP (VoIP) are considered advanced Internet applications/services, they are vulnerable to attacks existing in Internet applications/services. For instance HTTP digest authentication attacks, malformed messages, message tampering with malicious code, SQL injection and more, can be launched against any Internet application/service. In this paper, we describe,...
متن کاملTesting for Tautology based SQL Injection Attack using Runtime Monitors
Today, all commercial and business applications (ecommerce, banking, blogs, web mail, etc.,) are built as webbased database applications. Increasing prominence and usage of these applications has made them more susceptible to attacks because they store huge amount of sensitive user information. Traditional security mechanisms like network firewalls, intrusion detection systems, and use of encry...
متن کاملA Propose Model for Prevention of Attack SQL Injection
SQL attacks are growing concerns for the security threats to Web applications. The attackers use the SQL to manipulate the applications and manage to penetrate into the databases underlying the applications. This leads to unauthorized access to the potentially sensitive information. In this paper, we intend to discuss various methods through which SQL injection can be done. Also, we purport the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Engineering and Applied Technology
سال: 2021
ISSN: 2716-2265,2716-2257
DOI: 10.21831/jeatech.v1i2.35497