Loading...
Please wait, while we are loading the content...
Multidimensional Analysis of SQL Injection Attacks in web Applications
| Content Provider | Semantic Scholar |
|---|---|
| Author | Radhika, N. Vanitha, A. |
| Copyright Year | 2014 |
| Abstract | INTRODUCTION In recent years, wide spread adoption of the internet has resulted in to rapid advancement in information technologies. The internet is used by the general population for the such as financial transactions, educational endeavor, and countless other activities. The use of internet for accomplishing important task, such as transfer a balance from a bank account, always comes with a security risk. The database system behind this secure websites store non-critical data along with sensitive information, in a way that allows the information owners quick access while blocking break in attempts from unauthorized users.A common break -in strategy is to try to access sensitive information from a database by generating a query that will cause the database parse to malfunction, followed by applying this query to the desired database .Such an approach to gaining access to private information is called SQL injection. To get a better understanding of SQL injection, we need to have a good understanding of the kinds of communications that takes place during a typical session between user and a web application. The following figure shows the typical communication exchange between all the components in a typical web application system. WEB APPLICATION ARCHITECTURE |
| File Format | PDF HTM / HTML |
| Volume Number | 1 |
| Alternate Webpage(s) | http://ijiset.com/v1s3/IJISET_V1_I3_61.pdf |
| Language | English |
| Access Restriction | Open |
| Content Type | Text |
| Resource Type | Article |