Please use this identifier to cite or link to this item:
Title: Case study on SQL injection security attack
Authors: Low, Kok Jun.
Keywords: DRNTU::Engineering::Electrical and electronic engineering::Computer hardware, software and systems
Issue Date: 2010
Abstract: SQL injection attacks pose a serious security threat to Web applications. They allow hackers to obtain unrestricted access to databases underlying the applications and to the potentially sensitive information these database contain. Although researchers have proposed various methods to address the SQL injection problem, but failed to address the full scope of the problem as the method can only solve a subset of the wide range of SQL injection techniques that can be exploited by hackers. To address this problem, this report presents an extensive review of the different types of SQL injection attacks known to date. In this report, description and example of one presented to illustrate how attacks could be exploited and detected. Prevention techniques against various SQL injection attacks are also discussed.
Schools: School of Electrical and Electronic Engineering 
Rights: Nanyang Technological University
Fulltext Permission: restricted
Fulltext Availability: With Fulltext
Appears in Collections:EEE Student Reports (FYP/IA/PA/PI)

Files in This Item:
File Description SizeFormat 
  Restricted Access
3.22 MBAdobe PDFView/Open

Page view(s) 5

Updated on Jun 23, 2024

Download(s) 50

Updated on Jun 23, 2024

Google ScholarTM


Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.