[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Raveshi et al. - Google Patents

Investigation and Analysis of SQL Injection Attacks on Web Applications: Survey

Raveshi et al.

View PDF
Document ID
1018088880975626255
Author
Raveshi Z
Idate S
Publication venue
International Journal of Engineering and Advanced Technology (IJEAT) ISSN

External Links

Snippet

SQL injection attacks are a serious security threat to Web applications. They allow attackers to gain unrestricted access to the databases underlying the applications and to retrieve sensitive information from databases. Many researchers and practitioners have proposed …
Continue reading at citeseerx.ist.psu.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2127Bluffing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2119Authenticating web pages, e.g. with suspicious links
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect

Similar Documents

Publication Publication Date Title
US8146135B2 (en) Establishing and enforcing security and privacy policies in web-based applications
US7051366B1 (en) Evidence-based security policy manager
US8341104B2 (en) Method and apparatus for rule-based masking of data
US8181221B2 (en) Method and system for masking data
US8146165B2 (en) Method and apparatus for providing a data masking portal
Al-Khurafi et al. Survey of web application vulnerability attacks
US20070226783A1 (en) User-administered single sign-on with automatic password management for web server authentication
US9722973B1 (en) System and method to anonymize data transmitted to a destination computing device
US20070011742A1 (en) Communication information monitoring apparatus
US8499170B1 (en) SQL injection prevention
Das et al. An approach to detection of SQL injection attack based on dynamic query matching
Shanmugam et al. A solution to block cross site scripting vulnerabilities based on service oriented architecture
Medhane Efficient solution for SQL injection attack detection and prevention
Jovičić et al. Common web application attack types and security using asp. net
Raveshi et al. Investigation and Analysis of SQL Injection Attacks on Web Applications: Survey
Asha et al. Preventing sql injection attacks
Nabi Designing a framework method for secure business application logic integrity in e-commerce systems
Mishra et al. A REVIEW ON SQL INJECTION, DETECTION AND PREVENTIONS TECHNIQUES
Luong Intrusion detection and prevention system: SQL-injection attacks
US20020144157A1 (en) Method and apparatus for security of a network server
Landsmann et al. Web application security: A survey of prevention techniques against sql injection
Mishra et al. XML-Based Authentication to Handle SQL Injection
Pandey Securing web applications from application-level attack
Swarup et al. Web Vulnerability Scanner (WVS): A Tool for detecting Web Application Vulnerabilities
Halde SQL Injection analysis, Detection and Prevention