>
Fa   |   Ar   |   En
   Review on sql injection protection methods and tools  
   
نویسنده saidu aliero m. ,ghani i. ,zainudden s. ,murad khan m. ,bello m.
منبع jurnal teknologi - 2015 - دوره : 77 - شماره : 13 - صفحه:49 -66
چکیده    Sql injection vulnerability is one of the most common web-based application vulnerabilities that can be exploited by sql injection attack. successful sql injection attacks (sqlia) result in unauthorized access and unauthorized data modification. researchers have proposed many methods to tackle sql injection attack,however these methods fail to address the whole problem of sql injection attack,because most of the approaches are vulnerable in nature,cannot resist sophisticated attack or limited to scope of subset of sqlia type. in this paper we provide a detailed background of sqlia together with vulnerable php code to demonstrate how attacks are being carried out,and discuss most commonly used method by programmers to defend against sqlia and the disadvantages of such an approach. lastly we reviewed most commonly use tools and methods that act a firewall for preventing sqlia,finally wean alytically evaluated reviewed tools and methods based on our experience with respect to five different perspectives. our evaluation results point out common trends on current sqli prevention tools and methods. most of these methods and tools have problems addressing store-procedure attacks,as well as problems addressing attacks that take advantage of second order sqli vulnerability. our evaluation also shows that only a few of these methods and tools considered can be deployed in all web-based application platforms. © 2015 penerbit utm press. all rights reserved.
کلیدواژه Approach; Attack; Injection; Method; Parameters; Prevention; Query
آدرس department of computer science,universiti teknologi malaysia,utm,johor bahru, Malaysia, department of computer science,universiti teknologi malaysia,utm,johor bahru, Malaysia, department of computer science,universiti teknologi malaysia,utm,johor bahru, Malaysia, department of computer science,universiti teknologi malaysia,utm,johor bahru, Malaysia, department of computer science,universiti teknologi malaysia,utm,johor bahru, Malaysia
 
     
   
Authors
  
 
 

Copyright 2023
Islamic World Science Citation Center
All Rights Reserved