Addressing MDX Injection issue in Big Data using ASCII Based String Matching
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 4
Abstract
MDX injection is one of the most threats for application written for Web. Big data is the ability of providing exponential growth and availability of data. Since the data in here are unstructured and therefore normal Query language prevention techniques are not enough for preventing MDX injection attack. Here I proposed a new technique that can address the issue efficiently using ASCII based String Matching algorithm. In this technique Detect Spiteful character, Constraint Validation, Query length validation and Text based Key Generator are the four types of filtration technique used to detect and prevent the Injection Attacks from accessing the database.
Authors and Affiliations
Y Meena Priyadarshini
Design of The CAN Bus Booster Pack and The Implementation of The CAN Protocol on the TIVA C Launch pad Evaluation Board
This paperis about the practical design of a CAN Bus Boosterpack and the implementation of the CAN protocol on the TIVA C Launchpad evaluation board. The boosterpack board contains a CAN transceiver that can make com...
Image Watermarking And Its Techniques: A Review
With the fast development in computer network and multimedia technology, the need of protecting the ownership of digital media becomes a major issue. Digital watermarking is a process of hiding imperceptible data int...
An Effective Cost Optimization for Thickness Measurement of Metallic Plates
A sensor is a device which receives and responds to a signal when touched. A sensor's sensitivity indicates how much the sensor's output changes when the measured quantity changes. It measures a physical quantity and...
ECG Noise Reduction By Different Filters – A Comparative Analysis
The electrocardiogram (ECG or EKG) is a diagnostic tool that measures and records the electrical activity of the heart in exquisite detail. The electrocardiogram is commonly used to detect abnormal heart rhythms and...
Detecting of Disconnected from Source (DOS) and Connected but a Cut Occurred Somewhere (CCOS) in Wireless Sensor Networks
A wireless sensor network can get separated into multiple connected sensors .but some nodes are failure due to mechanical, electrical problems, environmental degradation battery depletion or hostile tampering. which...