Please use this identifier to cite or link to this item:
|Title:||Case study on SQL injection security attack||Authors:||Low, Kok Jun.||Keywords:||DRNTU::Engineering::Electrical and electronic engineering::Computer hardware, software and systems||Issue Date:||2010||Abstract:||SQL injection attacks pose a serious security threat to Web applications. They allow hackers to obtain unrestricted access to databases underlying the applications and to the potentially sensitive information these database contain. Although researchers have proposed various methods to address the SQL injection problem, but failed to address the full scope of the problem as the method can only solve a subset of the wide range of SQL injection techniques that can be exploited by hackers. To address this problem, this report presents an extensive review of the different types of SQL injection attacks known to date. In this report, description and example of one presented to illustrate how attacks could be exploited and detected. Prevention techniques against various SQL injection attacks are also discussed.||URI:||http://hdl.handle.net/10356/42518||Rights:||Nanyang Technological University||Fulltext Permission:||restricted||Fulltext Availability:||With Fulltext|
|Appears in Collections:||EEE Student Reports (FYP/IA/PA/PI)|
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.