Loading…

Evaluation of SQL Injection Prevention Methods

In the last few years, the usage and dependency on web applications and websites has significantly increased across a number of different areas such as online banking, shopping, financial transactions etc. amongst the several other areas. This has even directly multiplied the threat of SQL injection...

Full description

Saved in:
Bibliographic Details
Main Authors: Hasan, Jasim, Zeki, Ahmed M., Alharam, Aysha, Al-Mashhur, Nuha
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 6
container_issue
container_start_page 1
container_title
container_volume
creator Hasan, Jasim
Zeki, Ahmed M.
Alharam, Aysha
Al-Mashhur, Nuha
description In the last few years, the usage and dependency on web applications and websites has significantly increased across a number of different areas such as online banking, shopping, financial transactions etc. amongst the several other areas. This has even directly multiplied the threat of SQL injection issue. A number of past studies have suggested that SQL injection should be handled as effectively as possible in order to avoid long term threats and dangers. This paper in specific attempts to discuss and evaluate some of the main SQL injection prevention methods.
doi_str_mv 10.1109/ICMSAO.2019.8880301
format conference_proceeding
fullrecord <record><control><sourceid>ieee_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_8880301</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8880301</ieee_id><sourcerecordid>8880301</sourcerecordid><originalsourceid>FETCH-LOGICAL-i118t-782e89ade814a9a053cde815358fc18e9695f047f44c7c11f6dd6a90833c89ba3</originalsourceid><addsrcrecordid>eNotj81Kw0AURkdBsNQ8QTd5gcR7587PnWUJVQspVarrMk5mMKUmksSCby_Wrs7hLD74hFgglIjg7tfVZrfclhLQlcwMBHglMmcZNbGxhpW6FjOpLRVaWnMrsnE8AABJIGXkTJSrkz9--6ntu7xP-e6lztfdIYZzeB7iKXZn3cTpo2_GO3GT_HGM2YVz8faweq2einr7uK6WddEi8lRYlpGdbyKj8s6DpvDnmjSngBydcTqBskmpYANiMk1jvAMmCuzePc3F4n-3jTHuv4b20w8_-8tD-gX0-kOl</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Evaluation of SQL Injection Prevention Methods</title><source>IEEE Xplore All Conference Series</source><creator>Hasan, Jasim ; Zeki, Ahmed M. ; Alharam, Aysha ; Al-Mashhur, Nuha</creator><creatorcontrib>Hasan, Jasim ; Zeki, Ahmed M. ; Alharam, Aysha ; Al-Mashhur, Nuha</creatorcontrib><description>In the last few years, the usage and dependency on web applications and websites has significantly increased across a number of different areas such as online banking, shopping, financial transactions etc. amongst the several other areas. This has even directly multiplied the threat of SQL injection issue. A number of past studies have suggested that SQL injection should be handled as effectively as possible in order to avoid long term threats and dangers. This paper in specific attempts to discuss and evaluate some of the main SQL injection prevention methods.</description><identifier>EISSN: 2573-5276</identifier><identifier>EISBN: 9781538676844</identifier><identifier>EISBN: 1538676842</identifier><identifier>EISBN: 9781538676837</identifier><identifier>EISBN: 1538676834</identifier><identifier>DOI: 10.1109/ICMSAO.2019.8880301</identifier><language>eng</language><publisher>IEEE</publisher><subject>Evaluation ; SQL Injection Prevention Methods ; Web Applications</subject><ispartof>2019 8th International Conference on Modeling Simulation and Applied Optimization (ICMSAO), 2019, p.1-6</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8880301$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,778,782,787,788,27908,54538,54915</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/8880301$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Hasan, Jasim</creatorcontrib><creatorcontrib>Zeki, Ahmed M.</creatorcontrib><creatorcontrib>Alharam, Aysha</creatorcontrib><creatorcontrib>Al-Mashhur, Nuha</creatorcontrib><title>Evaluation of SQL Injection Prevention Methods</title><title>2019 8th International Conference on Modeling Simulation and Applied Optimization (ICMSAO)</title><addtitle>ICMSAO</addtitle><description>In the last few years, the usage and dependency on web applications and websites has significantly increased across a number of different areas such as online banking, shopping, financial transactions etc. amongst the several other areas. This has even directly multiplied the threat of SQL injection issue. A number of past studies have suggested that SQL injection should be handled as effectively as possible in order to avoid long term threats and dangers. This paper in specific attempts to discuss and evaluate some of the main SQL injection prevention methods.</description><subject>Evaluation</subject><subject>SQL Injection Prevention Methods</subject><subject>Web Applications</subject><issn>2573-5276</issn><isbn>9781538676844</isbn><isbn>1538676842</isbn><isbn>9781538676837</isbn><isbn>1538676834</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2019</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotj81Kw0AURkdBsNQ8QTd5gcR7587PnWUJVQspVarrMk5mMKUmksSCby_Wrs7hLD74hFgglIjg7tfVZrfclhLQlcwMBHglMmcZNbGxhpW6FjOpLRVaWnMrsnE8AABJIGXkTJSrkz9--6ntu7xP-e6lztfdIYZzeB7iKXZn3cTpo2_GO3GT_HGM2YVz8faweq2einr7uK6WddEi8lRYlpGdbyKj8s6DpvDnmjSngBydcTqBskmpYANiMk1jvAMmCuzePc3F4n-3jTHuv4b20w8_-8tD-gX0-kOl</recordid><startdate>201904</startdate><enddate>201904</enddate><creator>Hasan, Jasim</creator><creator>Zeki, Ahmed M.</creator><creator>Alharam, Aysha</creator><creator>Al-Mashhur, Nuha</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201904</creationdate><title>Evaluation of SQL Injection Prevention Methods</title><author>Hasan, Jasim ; Zeki, Ahmed M. ; Alharam, Aysha ; Al-Mashhur, Nuha</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i118t-782e89ade814a9a053cde815358fc18e9695f047f44c7c11f6dd6a90833c89ba3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Evaluation</topic><topic>SQL Injection Prevention Methods</topic><topic>Web Applications</topic><toplevel>online_resources</toplevel><creatorcontrib>Hasan, Jasim</creatorcontrib><creatorcontrib>Zeki, Ahmed M.</creatorcontrib><creatorcontrib>Alharam, Aysha</creatorcontrib><creatorcontrib>Al-Mashhur, Nuha</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE/IET Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Hasan, Jasim</au><au>Zeki, Ahmed M.</au><au>Alharam, Aysha</au><au>Al-Mashhur, Nuha</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Evaluation of SQL Injection Prevention Methods</atitle><btitle>2019 8th International Conference on Modeling Simulation and Applied Optimization (ICMSAO)</btitle><stitle>ICMSAO</stitle><date>2019-04</date><risdate>2019</risdate><spage>1</spage><epage>6</epage><pages>1-6</pages><eissn>2573-5276</eissn><eisbn>9781538676844</eisbn><eisbn>1538676842</eisbn><eisbn>9781538676837</eisbn><eisbn>1538676834</eisbn><abstract>In the last few years, the usage and dependency on web applications and websites has significantly increased across a number of different areas such as online banking, shopping, financial transactions etc. amongst the several other areas. This has even directly multiplied the threat of SQL injection issue. A number of past studies have suggested that SQL injection should be handled as effectively as possible in order to avoid long term threats and dangers. This paper in specific attempts to discuss and evaluate some of the main SQL injection prevention methods.</abstract><pub>IEEE</pub><doi>10.1109/ICMSAO.2019.8880301</doi><tpages>6</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier EISSN: 2573-5276
ispartof 2019 8th International Conference on Modeling Simulation and Applied Optimization (ICMSAO), 2019, p.1-6
issn 2573-5276
language eng
recordid cdi_ieee_primary_8880301
source IEEE Xplore All Conference Series
subjects Evaluation
SQL Injection Prevention Methods
Web Applications
title Evaluation of SQL Injection Prevention Methods
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-16T14%3A46%3A48IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Evaluation%20of%20SQL%20Injection%20Prevention%20Methods&rft.btitle=2019%208th%20International%20Conference%20on%20Modeling%20Simulation%20and%20Applied%20Optimization%20(ICMSAO)&rft.au=Hasan,%20Jasim&rft.date=2019-04&rft.spage=1&rft.epage=6&rft.pages=1-6&rft.eissn=2573-5276&rft_id=info:doi/10.1109/ICMSAO.2019.8880301&rft.eisbn=9781538676844&rft.eisbn_list=1538676842&rft.eisbn_list=9781538676837&rft.eisbn_list=1538676834&rft_dat=%3Cieee_CHZPO%3E8880301%3C/ieee_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i118t-782e89ade814a9a053cde815358fc18e9695f047f44c7c11f6dd6a90833c89ba3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=8880301&rfr_iscdi=true