...
首页> 外文期刊>Journal of Economics and Sustainable Development >SQL Injection Attacks - Its Prevention using Flag Sequencing Approach
【24h】

SQL Injection Attacks - Its Prevention using Flag Sequencing Approach

机译:SQL注入攻击-使用标志排序方法的预防

获取原文
           

摘要

SQL injection attack is a code injection technique used to attack database through website. This happens when the user input is not correctly filtered for string literal escape characters which are present in the statement or when the user input is not strongly typed. In computer science, a type system is said to feature strong typing when it specifies one or more restrictions on how operations involving values of different data types can be intermixed.. [8]. SQL injection is one of the top ten web application attacks.In this paper a method is proposed in which two approaches, one static in which the database is created and another dynamic in which the query structure against the previously stored query structure is compared. If the two structures match then search is stopped and query is regarded as a valid query otherwise the query is an invalid query and is not allowed to access data from database. The Algorithm has been developed using Java. Keywords: Malicious, Flag , Vulnerability, malicious, SQLIA’s.
机译:SQL注入攻击是一种代码注入技术,用于通过网站攻击数据库。当用户输入未正确过滤语句中出现的字符串文字转义字符时,或者未强烈键入用户输入时,就会发生这种情况。在计算机科学中,当类型系统对涉及不同数据类型的值的操作如何混合时指定一个或多个限制时,据说类型系统具有强类型。[8]。 SQL注入是十大Web应用程序攻击之一。在本文中,提出了一种方法,其中有两种方法,一种是创建数据库的静态方法,另一种是将查询结构与以前存储的查询结构进行比较的动态方法。如果两个结构匹配,则停止搜索,并将查询视为有效查询,否则该查询为无效查询,并且不允许从数据库访问数据。该算法是使用Java开发的。关键字:恶意,标志,漏洞,恶意,SQLIA。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号