COMBINATORIAL APPROACH FOR PREVENTING SQL INJECTION ATTACKS
#1

COMBINATORIAL APPROACH FOR PREVENTING SQL INJECTION ATTACKS

A combinatorial approach for protecting Web applications against SQL injection is discussed in this paper, which is a novel idea of incorporating the uniqueness of Signature based method and auditing method. The major issue of web application security is the SQL Injection, which can give the attackers unrestricted access to the database that underlie Web applications and has become increasingly frequent and serious. From signature based method standpoint of view, it presents a detection mode for SQL injection using pair wise sequence alignment of amino acid code formulated from web application form parameter sent via web server. On the other hand from the Auditing based method standpoint of view, it analyzes the transaction to find out the malicious access. In signature based method It uses an approach called Hirschberg algorithm, it is a divide and conquer approach to reduce the time and space complexity. This system was able to stop all of the successful attacks and did not generate any false positives.

Technology to use: JAVA
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: java sql resultset getint null, protecting against sql injection, sql injection attacks ppt, blind sql injection, sql injection traceback, download ppt on sql injection for seminar, ppt for an approach to detect and prevent sql injection attacks in database using web service,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
COMBINATORIAL APPROACH FOR PREVENTING SQL INJECTION ATTACKS - by electronics seminars - 13-01-2010, 07:43 AM

Possibly Related Threads...
Thread Author Replies Views Last Post
  A Link-Based Cluster Ensemble Approach for Categorical Data Clustering 1 1,161 16-02-2017, 10:51 AM
Last Post: jaseela123d
  Packet-Hiding Methods for Preventing Selective Jamming Attacks 1 732 14-02-2017, 11:35 AM
Last Post: ijasti
  An Acknowledgement-Based Approach for the Detection of routing misbehavior in MANETs mechanical engineering crazy 2 3,034 26-05-2015, 03:04 PM
Last Post: seminar report asees
  An Acknowledgment-Based Approach For The Detection Of Routing Misbehavior In MANETs electronics seminars 7 4,812 27-01-2015, 12:09 AM
Last Post: Guest
  A PROACTIVE APPROACH TO NETWORK SECURITY nit_cal 1 2,342 19-09-2014, 12:52 AM
Last Post: [email protected]
  Packet-Hiding Methods for Preventing Selective Jamming Attacks Projects9 5 4,470 30-07-2013, 05:30 PM
Last Post: mounikabujji
  Revisiting Defenses against Large-Scale Online Password Guessing Attacks Projects9 5 3,997 18-03-2013, 12:25 PM
Last Post: computer topic
  PREVENTION OF SQL INJECTION AND DATA THEFTS USING DIVIDE AND CONQUER APPROACH seminar presentation 3 4,261 24-10-2012, 01:09 PM
Last Post: seminar details
  A Geometric Approach to Improving Active Packet Loss Measurement full report project topics 2 2,712 09-04-2012, 06:01 PM
Last Post: [email protected]
  Layered Approach Using Conditional Random Fields For Intrusion Detection project topics 2 1,733 06-03-2012, 11:35 AM
Last Post: raviteja538

Forum Jump: