Tuesday 16th of April 2024
 

Methods of Identifying and Preventing SQL Attacks


Bojken Shehu, Aleksander Xhuvani and Shqiponja Ahmetaj

The paper begins by identifying the organizations which are vulnerable to the SQL attack referred to as an SQL injection attack (SQLIA). The term SQL injection attackĀ is defined and a diagram (Fig.1) is used to illustrate the way that attack occurs. In another section, the paper identifies the methods used to detect an attack to SQL, whereby the techniques are discussed extensively using relevant diagrams for illustration. The other sections cover the preventive methods, where the methods are also discussed with an illustration using diagrams.

Keywords: SQLIA, WebSSARI, WAVE, AMNESIA, SQL DOM, tautology

Download Full-Text


ABOUT THE AUTHORS

Bojken Shehu
Bojken Shehu. He is a pedagogue in Polytechnic University of Tirana, Faculty of Information Technology, in Computer Engineering Department. In 2010 he has finished the Master Thesis in Bauman Moscow State Technical University, Russia and now he is a PhD student in Polytechnic University of Tirana. His PhD topic according to database security direction.

Aleksander Xhuvani
Aleksander Xhuvani. He is a chief of Computer Software Department in Polytechnic University. He has finished the PhD study at Bordeaux in France. At 2004 he is graduated as Prof.Dr.

Shqiponja Ahmetaj
Shqiponja Ahmetaj. She is a Master of Science student in Vienna University of Technology, Faculty of Informatics. In 2011 she has finished the Bachelor Thesis in Saint Petersburg State Polytechnical University, Russia with excellent results.


IJCSI Published Papers Indexed By:

 

 

 

 
+++
About IJCSI

IJCSI is a refereed open access international journal for scientific papers dealing in all areas of computer science research...

Learn more »
Join Us
FAQs

Read the most frequently asked questions about IJCSI.

Frequently Asked Questions (FAQs) »
Get in touch

Phone: +230 911 5482
Email: info@ijcsi.org

More contact details »