Journal of Engineering and Applied Sciences

Year: 2019
Volume: 14
Issue: 5 SI
Page No. 9185 - 9192

Detection and Prevention SQL Injection using MCA Technique

Authors : Bashar M. Nema and Hanan Abed AL Wally

References

Aich, D., 2009. Secure query processing by blocking SQL injection. MSc Thesis, National Institute of Technology Rourkela, Rourkela, India.

Ali, N.S., A.S. Shibghatullah and M.H. Al Attar, 2015. Review of the defensive approaches for structured query language injection attacks and their countermeasures. J. Theoret. Applied Inform. Technol., 2076: 258-269.
Direct Link  |  

Athanasopoulos, E., A. Krithinakis and E.P. Markatos, 2010. An architecture for enforcing javascript randomization in web2.0 applications. Proceedings of the International Conference on Information Security Vol. 6531, October 25-28, 2010, Springer, Berlin, Germany, pp: 203-209.

Dharam, R. and S.G. Shiva, 2014. Testing for tautology based SQL injection attack using runtime monitors. Intl. J. Eng. Technol., 6: 1-4.
Direct Link  |  

Gadgil, S., 2013. SQL injection prevention in banking. Intl. J. Comput. Sci. Inf. Technol., 4: 345-349.
Direct Link  |  

Halfond, W.G.J., S.R. Choudhary and A. Orso, 2011. Improving penetration testing through static and dynamic analysis. Software Test. Verif. Reliabil., 21: 195-214.
CrossRef  |  

Jane, P.Y. and M.S. Chaudhari, 2012. SQLIA: Detection and prevention techniques: A survey. IOSR. J. Comput. Eng., 2: 56-60.
Direct Link  |  

Joshi, A. and V. Geetha, 2014. SQL injection detection using machine learning. Proceedings of the 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), July 10-11, 2014, IEEE, Kanyakumari, India, ISBN:978-1-4799-4191-9, pp: 1111-1115.

Kareem, E.I.A., 2012. A real time visual monitoring module for traffic conditions based on a modified auto-associative memory. Ph.D Thesis, University Sains Malaysia, Penang, Malaysia.

Kindy, D.A. and A.S.K. Pathan, 2012. A detailed survey on various aspects of SQL injection in web applications: Vulnerabilities, innovative attacks and remedies. Cryptography Secur., 1: 1-13.
Direct Link  |  

Kumar, D.G. and M. Chatterjee, 2014. SQL injection prevention in banking. Intl. J. Comput. Network Inf. Secur., 1: 56-63.

Ladole, A. and M.D. Phalke, 2016. SQL injection attack and user behavior detection by using query tree fisher score and SVM classification. Intl. Res. J. Eng. Technol., 3: 1505-1509.
Direct Link  |  

Manoj, R.J., A. Chandrasekhar and M.D.A. Praveena, 2014. An approach to detect and prevent tautology type SQL injection in web service based on XSchema validation. Intl. J. Eng. Comput. Sci., 3: 3695-3699.
Direct Link  |  

Matsuda, T., 2013. On the property of the distribution of symbols in SQL injection attack. Intl. J. Intell. Comput. Res., 4: 376-381.
Direct Link  |  

Pinzon, C.I., J.F. De Paz, A. Herrero, E. Corchado and J. Bajo et al., 2013. idMAS-SQL: Intrusion detection based on MAS to detect and block SQL injection through data mining. Inf. Sci., 231: 15-31.
Direct Link  |  

Prabakar, M.A., M.K. Keyan and K. Marimuthu, 2013. An efficient technique for preventing SQL injection attack using pattern matching algorithm. Proceedings of the IEEE International Conference on Emerging Trends in Computing, Communication and Nanotechnology (ICE-CCN), June 13, 2013, Tirunelveli, India, pp: 503-506.

Rahul, S., J. Bhattacharyji and R. Soni, 2012. SQL injection attacks in database using web service: Detection and prevention. Asian J. Comput. Sci. Inform. Technol., 2-6: 162-165.

Raj, S.N. and E. Sherly, 2018. SQL injection attack prevention by direct reverse resemblance technique. Intl. J. Pure Appl. Math., 118: 599-614.
Direct Link  |  

Rawat, R. and S.K. Shrivastav, 2012. SQL injection attack detection using SVM. Intl. J. Comput. Appl., 42: 1-4.
CrossRef  |  Direct Link  |  

Shafie, E., 2013. Runtime detection and prevention for structure query language injection attacks. Ph.D Thesis, Gateway House, Leicester, UK.

Singh, P., K. Thevar, P. Shetty and B. Shaikh, 2015. Detection of SQL injection and XSS vulnerability in web application. Intl. J. Eng. Appl. Sci., 2: 16-21.
Direct Link  |  

Tajpour, A., Z. JorJor and M. Shooshtari, 2010. Evaluation of SQL injection detection and prevention techniques. Proceeding of the 2nd International Conference Computational Intelligence, Communication Systems and Networks, July 28-30, 2010, Liverpool, pp: 216-221.

Verma, N. and A. Kaur, 2015. Prevention of SQL injection attack using hybrid approach. Intl. J. Adv. Res. Comput. Sci. Software Eng., 5: 1355-1359.
Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2022 All Rights Reserved