A review on the comparable analyses of SQL injection: attacks, vulnerabilities, and their detection techniquesAuthor(s):
Zargay HabibiAbstract: Background:
The concept of SQL injection is indeed a technique that exploits a security vulnerability that occurs in the application layer of a database. The attack takes benefits of weak input validation in code and website administration. It allows attackers to get illegal access to the back-and part of the database to modify the intended application which generate SQL queries.
Method: Pages: 06-10 | Views: 626 | Downloads: 250Download Full Article: Click Here
This paper does a review on comparable analysis to find out more on different types of attacks, vulnerabilities and their detection techniques.
Conclusion: According to the reviews which we have done researchers have offered several solutions to address SQL injection challenges. In addition to this, many of them have limitations and mostly cannot address all type of injection problems. More to this, several new types of injection attacks have arisen in the last several years. To better avoid such attacks, specifying and knowing existing techniques and methods are very important. In this research paper we discuss and review all types of SQL injection attack as well as different techniques and tools which can detect or avoid these attacks.
How to cite this article:
Zargay Habibi. A review on the comparable analyses of SQL injection: attacks, vulnerabilities, and their detection techniques. Int J Adv Acad Stud 2020;2(1):06-10.