Umfassende Service-Einschränkungen im Bereich Ausleihe ab 17. März!

Treffer: SQL-Injection Vulnerabilities Resolving using Valid Security Tool in Cloud.

Title:
SQL-Injection Vulnerabilities Resolving using Valid Security Tool in Cloud.
Source:
Pertanika Journal of Science & Technology; Jan2019, Vol. 27 Issue 1, p159-174, 16p
Database:
Complementary Index

Weitere Informationen

The cloud is storing a huge amount of the data, including personal and confidential details. It involves the third party over the internet and proposes many unreliable strings which can be proven as loopholes. Thus, securing the data in the cloud tends to be a major point of concern. SQL Injection Attacks (SQLIAs) are being acknowledged as one of the foremost web applications security threats. It initiates a vulnerable query to destroy the connected server systems and help attackers with unauthorized access to the databases resulting in identity theft and security violations. The paper proposes a hybrid solution whose information utility is higher than the solutions that are being proposed earlier. As the methodology is concerned over static, dynamic and runtime detection and prevention mechanism. It also classifies the malicious queries and inspires the system to be well prepared for the secure working environment by implementing a demonstration design. Through the experimental implementation, the query associativity makes success probability of 0.775 using the associativity formula that in fraction, results in a durable comparative solution proposed till date. [ABSTRACT FROM AUTHOR]

Copyright of Pertanika Journal of Science & Technology is the property of Universiti Putra Malaysia and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)