首页> 外文OA文献 >Critical issue to consider while developing SQL injection prevention mechanism
【2h】

Critical issue to consider while developing SQL injection prevention mechanism

机译:开发SQL注入预防机制时要考虑的关键问题

摘要

SQL injection vulnerability is the one of the most common web-based application vulnerabilities that can be exploited by SQL injection attack to gain access to restricted data, bypass authentication mechanism and execute unauthorized data manipulation language. Defensive coding is the simple and affordable way to tackle this problem, by applying secure coding in each an every queries used in application. In this paper we provide a detailed background of SQLI attack, we classify defensive coding into different categories, review existing techniques that are related to each technique, and also evaluate such techniques based on number of attacks they were able to stop.We also evaluated each category of approach based on it's deployment requirement related to inheritance. Currently, to the best of our knowledge no papers have classied defensive coding as we do.
机译:SQL注入漏洞是最常见的基于Web的应用程序漏洞之一,SQL注入攻击可利用此漏洞来获取对受限数据的访问,绕过身份验证机制并执行未经授权的数据操作语言。通过在应用程序中使用的每个查询中都应用安全编码,防御性编码是解决此问题的简单且负担得起的方法。在本文中,我们提供了详细的SQLI攻击背景,将防御性编码分为不同类别,回顾了与每种技术相关的现有技术,并根据这些技术能够阻止的攻击次数对其进行了评估。基于与继承相关的部署要求的方法类别。目前,据我们所知,没有论文像我们这样对防御性编码进行分类。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号