Loading…
Evaluation of SQL Injection Prevention Methods
In the last few years, the usage and dependency on web applications and websites has significantly increased across a number of different areas such as online banking, shopping, financial transactions etc. amongst the several other areas. This has even directly multiplied the threat of SQL injection...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 6 |
container_issue | |
container_start_page | 1 |
container_title | |
container_volume | |
creator | Hasan, Jasim Zeki, Ahmed M. Alharam, Aysha Al-Mashhur, Nuha |
description | In the last few years, the usage and dependency on web applications and websites has significantly increased across a number of different areas such as online banking, shopping, financial transactions etc. amongst the several other areas. This has even directly multiplied the threat of SQL injection issue. A number of past studies have suggested that SQL injection should be handled as effectively as possible in order to avoid long term threats and dangers. This paper in specific attempts to discuss and evaluate some of the main SQL injection prevention methods. |
doi_str_mv | 10.1109/ICMSAO.2019.8880301 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_8880301</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8880301</ieee_id><sourcerecordid>8880301</sourcerecordid><originalsourceid>FETCH-LOGICAL-i118t-782e89ade814a9a053cde815358fc18e9695f047f44c7c11f6dd6a90833c89ba3</originalsourceid><addsrcrecordid>eNotj81Kw0AURkdBsNQ8QTd5gcR7587PnWUJVQspVarrMk5mMKUmksSCby_Wrs7hLD74hFgglIjg7tfVZrfclhLQlcwMBHglMmcZNbGxhpW6FjOpLRVaWnMrsnE8AABJIGXkTJSrkz9--6ntu7xP-e6lztfdIYZzeB7iKXZn3cTpo2_GO3GT_HGM2YVz8faweq2einr7uK6WddEi8lRYlpGdbyKj8s6DpvDnmjSngBydcTqBskmpYANiMk1jvAMmCuzePc3F4n-3jTHuv4b20w8_-8tD-gX0-kOl</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Evaluation of SQL Injection Prevention Methods</title><source>IEEE Xplore All Conference Series</source><creator>Hasan, Jasim ; Zeki, Ahmed M. ; Alharam, Aysha ; Al-Mashhur, Nuha</creator><creatorcontrib>Hasan, Jasim ; Zeki, Ahmed M. ; Alharam, Aysha ; Al-Mashhur, Nuha</creatorcontrib><description>In the last few years, the usage and dependency on web applications and websites has significantly increased across a number of different areas such as online banking, shopping, financial transactions etc. amongst the several other areas. This has even directly multiplied the threat of SQL injection issue. A number of past studies have suggested that SQL injection should be handled as effectively as possible in order to avoid long term threats and dangers. This paper in specific attempts to discuss and evaluate some of the main SQL injection prevention methods.</description><identifier>EISSN: 2573-5276</identifier><identifier>EISBN: 9781538676844</identifier><identifier>EISBN: 1538676842</identifier><identifier>EISBN: 9781538676837</identifier><identifier>EISBN: 1538676834</identifier><identifier>DOI: 10.1109/ICMSAO.2019.8880301</identifier><language>eng</language><publisher>IEEE</publisher><subject>Evaluation ; SQL Injection Prevention Methods ; Web Applications</subject><ispartof>2019 8th International Conference on Modeling Simulation and Applied Optimization (ICMSAO), 2019, p.1-6</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8880301$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,778,782,787,788,27908,54538,54915</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/8880301$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Hasan, Jasim</creatorcontrib><creatorcontrib>Zeki, Ahmed M.</creatorcontrib><creatorcontrib>Alharam, Aysha</creatorcontrib><creatorcontrib>Al-Mashhur, Nuha</creatorcontrib><title>Evaluation of SQL Injection Prevention Methods</title><title>2019 8th International Conference on Modeling Simulation and Applied Optimization (ICMSAO)</title><addtitle>ICMSAO</addtitle><description>In the last few years, the usage and dependency on web applications and websites has significantly increased across a number of different areas such as online banking, shopping, financial transactions etc. amongst the several other areas. This has even directly multiplied the threat of SQL injection issue. A number of past studies have suggested that SQL injection should be handled as effectively as possible in order to avoid long term threats and dangers. This paper in specific attempts to discuss and evaluate some of the main SQL injection prevention methods.</description><subject>Evaluation</subject><subject>SQL Injection Prevention Methods</subject><subject>Web Applications</subject><issn>2573-5276</issn><isbn>9781538676844</isbn><isbn>1538676842</isbn><isbn>9781538676837</isbn><isbn>1538676834</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2019</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotj81Kw0AURkdBsNQ8QTd5gcR7587PnWUJVQspVarrMk5mMKUmksSCby_Wrs7hLD74hFgglIjg7tfVZrfclhLQlcwMBHglMmcZNbGxhpW6FjOpLRVaWnMrsnE8AABJIGXkTJSrkz9--6ntu7xP-e6lztfdIYZzeB7iKXZn3cTpo2_GO3GT_HGM2YVz8faweq2einr7uK6WddEi8lRYlpGdbyKj8s6DpvDnmjSngBydcTqBskmpYANiMk1jvAMmCuzePc3F4n-3jTHuv4b20w8_-8tD-gX0-kOl</recordid><startdate>201904</startdate><enddate>201904</enddate><creator>Hasan, Jasim</creator><creator>Zeki, Ahmed M.</creator><creator>Alharam, Aysha</creator><creator>Al-Mashhur, Nuha</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201904</creationdate><title>Evaluation of SQL Injection Prevention Methods</title><author>Hasan, Jasim ; Zeki, Ahmed M. ; Alharam, Aysha ; Al-Mashhur, Nuha</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i118t-782e89ade814a9a053cde815358fc18e9695f047f44c7c11f6dd6a90833c89ba3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Evaluation</topic><topic>SQL Injection Prevention Methods</topic><topic>Web Applications</topic><toplevel>online_resources</toplevel><creatorcontrib>Hasan, Jasim</creatorcontrib><creatorcontrib>Zeki, Ahmed M.</creatorcontrib><creatorcontrib>Alharam, Aysha</creatorcontrib><creatorcontrib>Al-Mashhur, Nuha</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE/IET Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Hasan, Jasim</au><au>Zeki, Ahmed M.</au><au>Alharam, Aysha</au><au>Al-Mashhur, Nuha</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Evaluation of SQL Injection Prevention Methods</atitle><btitle>2019 8th International Conference on Modeling Simulation and Applied Optimization (ICMSAO)</btitle><stitle>ICMSAO</stitle><date>2019-04</date><risdate>2019</risdate><spage>1</spage><epage>6</epage><pages>1-6</pages><eissn>2573-5276</eissn><eisbn>9781538676844</eisbn><eisbn>1538676842</eisbn><eisbn>9781538676837</eisbn><eisbn>1538676834</eisbn><abstract>In the last few years, the usage and dependency on web applications and websites has significantly increased across a number of different areas such as online banking, shopping, financial transactions etc. amongst the several other areas. This has even directly multiplied the threat of SQL injection issue. A number of past studies have suggested that SQL injection should be handled as effectively as possible in order to avoid long term threats and dangers. This paper in specific attempts to discuss and evaluate some of the main SQL injection prevention methods.</abstract><pub>IEEE</pub><doi>10.1109/ICMSAO.2019.8880301</doi><tpages>6</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | EISSN: 2573-5276 |
ispartof | 2019 8th International Conference on Modeling Simulation and Applied Optimization (ICMSAO), 2019, p.1-6 |
issn | 2573-5276 |
language | eng |
recordid | cdi_ieee_primary_8880301 |
source | IEEE Xplore All Conference Series |
subjects | Evaluation SQL Injection Prevention Methods Web Applications |
title | Evaluation of SQL Injection Prevention Methods |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-16T14%3A46%3A48IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Evaluation%20of%20SQL%20Injection%20Prevention%20Methods&rft.btitle=2019%208th%20International%20Conference%20on%20Modeling%20Simulation%20and%20Applied%20Optimization%20(ICMSAO)&rft.au=Hasan,%20Jasim&rft.date=2019-04&rft.spage=1&rft.epage=6&rft.pages=1-6&rft.eissn=2573-5276&rft_id=info:doi/10.1109/ICMSAO.2019.8880301&rft.eisbn=9781538676844&rft.eisbn_list=1538676842&rft.eisbn_list=9781538676837&rft.eisbn_list=1538676834&rft_dat=%3Cieee_CHZPO%3E8880301%3C/ieee_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i118t-782e89ade814a9a053cde815358fc18e9695f047f44c7c11f6dd6a90833c89ba3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=8880301&rfr_iscdi=true |