Please use this identifier to cite or link to this item:
https://idr.l1.nitk.ac.in/jspui/handle/123456789/8964
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Sadalkar, K. | - |
dc.contributor.author | Mohandas, R. | - |
dc.contributor.author | Pais, A.R. | - |
dc.date.accessioned | 2020-03-30T10:23:09Z | - |
dc.date.available | 2020-03-30T10:23:09Z | - |
dc.date.issued | 2011 | - |
dc.identifier.citation | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2011, Vol.7011 LNCS, , pp.3-15 | en_US |
dc.identifier.uri | http://idr.nitk.ac.in/jspui/handle/123456789/8964 | - |
dc.description.abstract | SQL Injection vulnerability is ranked 1st in the OWASP top 10 vulnerability list and has resulted in massive attacks on a number of websites in the past few years. Inspite of preventive measures like educating developers about safe coding practices, statistics shows that these vulnerabilities are still dominating the top. Various static and dynamic approaches have been proposed to mitigate this vulnerability. In this paper, we present a hybrid approach to prevent SQL injection attacks in PHP, a popular server side scripting language. This technique is more effective to prevent SQL injection attack in a dynamic web content environment without use of complex string analyzer logic. Initially, we construct a Query model for each hotspot by running the application in safe mode. In the production environment, dynamically generated queries are validated with it. The results and analysis shows the proposed approach is simple and effective to prevent common SQL injection vulnerabilities. � 2011 Springer-Verlag. | en_US |
dc.title | Model based hybrid approach to prevent SQL injection attacks in PHP | en_US |
dc.type | Book chapter | en_US |
Appears in Collections: | 2. Conference Papers |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.