Detection Block Model for SQL Injection Attacks

Download Now
Provided by: The International Journal of Innovative Research in Computer and Communication Engineering
Topic: Big Data
Format: PDF
With the rapid development of Internet, more and more organizations connect their databases to the Internet for resource sharing. However, due to developers' lack of knowledge of all possible attacks, web applications become vulnerable to multiple attacks. Thus the network databases could face multiple threats. Web applications generally consist of a three tier architecture where database is in the third pole, which is the most valuable asset in any organization. SQL injection is an attack technique used to exploit code by altering back-end SQL statements through manipulating input.
Download Now

Find By Topic