|
Methods of Identifying and Preventing SQL AttacksKeywords: SQLIA , WebSSARI , WAVE , AMNESIA , SQL DOM , tautology , IJCSI Abstract: The paper begins by identifying the organizations which are vulnerable to the SQL attack referred to as an SQL injection attack. The term SQL injection attack is defined and a diagram is used to illustrate the way that attack occurs. In another section, the paper identifies the methods used to detect an attack to SQL, whereby the techniques are discussed extensively using relevant diagrams for illustration. The other sections cover the preventive methods, where the methods are also discussed with an illustration using diagrams.
|