A Review on Enhancing the Security of Database using SQL Injection
Abstract
Full Text:
PDFReferences
M. Dornseif - Common Failures in Internet Applications, May 2005
William G.J. Hal fond, Jeremy Vie gas, and Alessandro Orso: A Classification of SQL Injection Attacks and Countermeasures 2006 IEEE.
D. A. Kindy and A. K. Pathan: A Survey on SQL Injection: Vulnerabilities, Attacks, and Prevention Techniques 2011 IEEE
Atefeh Tajpour, Suhaimi Ibrahim, Maslin Masrom: SQL Injection Detection and Prevention Techniques, International Journal of Advancements in Computing August 2011.
Geoffrey Vaughan- Understanding SQL injection attacks inside and out- University of Ontario Institute of Technology, Canada- 2012.
Pushkar Y.Jane, M.S.Chaudhari- SQLIA: Detection And Prevention Techniques: A Survey IOSR Journal of Computer Engineering September 2012
Asha N, M.Varun Kumar, Vaidhyanathan.G “Preventing SQL Injection Attacks”. The Third International Journal of Computer Applications volume52-no-13, 2012
Chad Dougherty- Practical Identification of SQL Injection Vulnerabilities, Carnegie Mellon University. Produced for US-CERT© 2012
V. Nithya, R.Regan, J.vijayaraghavan-A Survey on SQL Injection attacks, their Detection and Prevention Techniques- International Journal of Engineering and Computer Science April, 2013
Ericka Chickowski, Contributing Writer Dark Reading May, 2013 [11] OWSAP –The open web application security project (OWASP) available at www.owasp.org/index.php/mainpage last access Jan 2014
www.w3.org/protocols- last access January 2014.
Amit Banchhor, Tushar Vaidya” Sql injection: A Survey paper” International Journal of Advanced Technology in Engineering and Science Volume No 03, Special Issue No. 01, May 2015
Yash Tiwari, Mallika Tiwari” A Study of SQL of Injections Techniques and their Prevention Methods International Journal of Computer Applications (0975–8887)Volume 114–No. 17, March 2015
DOI: https://doi.org/10.23956/ijarcsse.v7i8.43
Refbacks
- There are currently no refbacks.