{"title":"使用字符串匹配和LCS方法检测各种SQL注入漏洞","authors":"V. Anitha, A. Lakshmi, M. Revathi, K. Selvi","doi":"10.1109/ICOAC.2014.7229717","DOIUrl":null,"url":null,"abstract":"Nowadays a lot of people are using the internet for sharing their personal and business information where there may be a chance for intruder to access the information. Hence, there is a need to take proper attention to overcome the vulnerabilities in the web pages. SQLI (SQL Injection) is a commonly occurring vulnerability where the intruder tries to access the back end (database) using SQL Query. Lot of research work has been done so far in order to prevent SQLI but still the problem remains as a challenge. Since, most of the technique will try to fix the problem in one perspective but in the other end there will be a huge flaw too. Hence, we require a proper system to detect the SQLI completely. Here, we are presenting a system which detects all type of SQLI vulnerabilities after elaborately reviewing the existing methods. Experimental result shows that our proposed system detects all type of SQLI vulnerability when compared with the existing techniques.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Detecting various SQL Injection vulnerabilities using String Matching and LCS method\",\"authors\":\"V. Anitha, A. Lakshmi, M. Revathi, K. Selvi\",\"doi\":\"10.1109/ICOAC.2014.7229717\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Nowadays a lot of people are using the internet for sharing their personal and business information where there may be a chance for intruder to access the information. Hence, there is a need to take proper attention to overcome the vulnerabilities in the web pages. SQLI (SQL Injection) is a commonly occurring vulnerability where the intruder tries to access the back end (database) using SQL Query. Lot of research work has been done so far in order to prevent SQLI but still the problem remains as a challenge. Since, most of the technique will try to fix the problem in one perspective but in the other end there will be a huge flaw too. Hence, we require a proper system to detect the SQLI completely. Here, we are presenting a system which detects all type of SQLI vulnerabilities after elaborately reviewing the existing methods. Experimental result shows that our proposed system detects all type of SQLI vulnerability when compared with the existing techniques.\",\"PeriodicalId\":325520,\"journal\":{\"name\":\"2014 Sixth International Conference on Advanced Computing (ICoAC)\",\"volume\":\"14 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 Sixth International Conference on Advanced Computing (ICoAC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICOAC.2014.7229717\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 Sixth International Conference on Advanced Computing (ICoAC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOAC.2014.7229717","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Detecting various SQL Injection vulnerabilities using String Matching and LCS method
Nowadays a lot of people are using the internet for sharing their personal and business information where there may be a chance for intruder to access the information. Hence, there is a need to take proper attention to overcome the vulnerabilities in the web pages. SQLI (SQL Injection) is a commonly occurring vulnerability where the intruder tries to access the back end (database) using SQL Query. Lot of research work has been done so far in order to prevent SQLI but still the problem remains as a challenge. Since, most of the technique will try to fix the problem in one perspective but in the other end there will be a huge flaw too. Hence, we require a proper system to detect the SQLI completely. Here, we are presenting a system which detects all type of SQLI vulnerabilities after elaborately reviewing the existing methods. Experimental result shows that our proposed system detects all type of SQLI vulnerability when compared with the existing techniques.