Please use this identifier to cite or link to this item: http://ir.futminna.edu.ng:8080/jspui/handle/123456789/28693
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAtiku, Mustapha-
dc.contributor.authorSaidu Aliero, Muhammad-
dc.contributor.authorAliyu Ardo, Abdulhamid-
dc.contributor.authorGhani, Imran-
dc.date.accessioned2024-05-21T16:33:36Z-
dc.date.available2024-05-21T16:33:36Z-
dc.date.issued2016-02-
dc.identifier.citationAliero, M. S., Ardo, A. A., Ghani, I., & Atiku, M. (2016). Classification of Sql Injection Detection And Prevention Measure. IOSR Journal of Engineering, 6(02).en_US
dc.identifier.issnISSN (e): 2250-3021-
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/28693-
dc.description.abstract: SQL injection vulnerability is the one of the most common web-based application vulnerabilities that can be exploited by SQL injection attack to gain access to restricted data, bypass authentication mechanism, and execute unauthorized data manipulation language. Defensive coding is a simple and affordable way to tackle this problem, however there are some issue regarding use of defensive coding which makes the system in effective, less resistant and resilience to attack. In this paper we provide detailed background of SQLIA (SQL Injection Attack), classified defensive coding to different categories, reviewed existing technique that are related to each techniques, state strength and weakness of such technique, evaluate such technique based on number of attacks they were able to stop and evaluate each category of approach based on its deployment requirements related to inheritance. The goal of this paper is to provide programmers with common issues that need to be considered before choosing a particular technique and to raise awareness of issues related to such techniques as many of those techniques were not meant for the purpose of protection of SQLIA. In addition, we hope to provide researchers by shedding light on how to develop good SQLI (SQL Injection) protection tools as most of the SQLI protection tools were developed using combination a of two or more defensive coding techniques. Lastly we provide recommendations on to avoid such issues.en_US
dc.language.isoenen_US
dc.publisherIOSR Journal of Engineeringen_US
dc.relation.ispartofseriesVolume 6;Issue 2-
dc.subjectSQL Injection, Defensive Coding, Injection Parameter, SQLI vulnerability.en_US
dc.titleClassification of Sql Injection Detection And Prevention Measureen_US
dc.typeArticleen_US
Appears in Collections:Information and Media Technology

Files in This Item:
File Description SizeFormat 
SQL INJECTION.pdfJOURNAL230.93 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.