Security Measures Against SQL Injection Attacks
Abstract
Keywords
Full Text:
PDFReferences
. Tipton, H. F., & Krause, M. (Eds.). (2006). Information Security Management Handbook, Volume 3 (Vol. 3). CRC press.
. Vacca, J. R. (Ed.). (2013). Managing information security. Elsevier.
. Burkhead, R. L. (2014). A phenomenological study of information security incidents experienced by information security professionals providing corporate information security incident management (Doctoral dissertation, Capella University).
. Lyall, F. (2011). International communications: The international telecommunication union and the universal postal union. Ashgate Publishing, Ltd..
. Von Solms, R. (1999). Information security management: why standards are important. Information Management & Computer Security.
. Peltier, T. R. (2016). Information Security Policies, Procedures, and Standards: guidelines for effective information security management. CRC Press.
. Rieck, K., & Laskov, P. (2006, July). Detecting unknown network attacks using language models. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 74-90). Springer, Berlin, Heidelberg.
. Halfond, W. G., & Orso, A. (2005, November). AMNESIA: analysis and monitoring for neutralizing SQL-injection attacks. In Proceedings of the 20th IEEE/ACM international Conference on Automated software engineering (pp. 174-183).
. Borade, M. R., & Deshpande, N. A. (2013). Extensive Review of SQLIA‘s Detection and Prevention Techniques. International Journal of Emerging Technology and Advanced Engineering, 3(10), 614-626.
. Boyd, S. W., & Keromytis, A. D. (2004, June). SQLrand: Preventing SQL injection attacks. In International Conference on Applied Cryptography and Network Security (pp. 292-302). Springer, Berlin, Heidelberg.
. Halfond, W. G., Viegas, J., & Orso, A. (2006, March). A classification of SQL-injection attacks and countermeasures. In Proceedings of the IEEE international symposium on secure software engineering (Vol. 1, pp. 13-15). IEEE.
. Clarke-Salt, J. (2009). SQL injection attacks and defense. Elsevier.
. Bruchez, R. (2012). Microsoft SQL Server 2012 security cookbook. Packt Publishing Ltd.
. Muthuprasanna, M., Wei, K., & Kothari, S. (2006, September). Eliminating SQL injection attacks-A transparent defense mechanism. In 2006 Eighth IEEE International Symposium on Web Site Evolution (WSE'06) (pp. 22-32). IEEE.
. Wei, K., Muthuprasanna, M., & Kothari, S. (2006, April). Preventing SQL injection attacks in stored procedures. In Australian Software Engineering Conference (ASWEC'06) (pp. 8-pp). IEEE.
. Sadeghian, A., Zamani, M., & Manaf, A. A. (2013, September). A taxonomy of SQL injection detection and prevention techniques. In 2013 international conference on informatics and creative multimedia (pp. 53-56). IEEE.
. Lee, I., Jeong, S., Yeo, S., & Moon, J. (2012). A novel method for SQL injection attack detection based on removing SQL query attribute values. Mathematical and Computer Modelling, 55(1-2), 58-68.
. Newman, R. C. (2006, September). Cybercrime, identity theft, and fraud: practicing safe internet-network security threats and vulnerabilities. In Proceedings of the 3rd annual conference on Information security curriculum development (pp. 68-78).
DOI: http://dx.doi.org/10.52155/ijpsat.v27.1.3063
Refbacks
- There are currently no refbacks.
Copyright (c) 2021 INTISAR MILAD MOHAMED ALSSULL

This work is licensed under a Creative Commons Attribution 4.0 International License.