Prevention of SQL Injection Attacks having XML Database
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 14, Issue 6
Abstract
XML-based Web applications are broadly utilized in computer world, whose main applications are remote operation performance and bring arbitrary data. It is recently used in cloud interfaces, E-Government, Service Oriented Architectures etc. Due to abundant acceptance of this technology large attacks are raised like Denial of Service attacks, attacks on XML Encryption, and XML Signature Wrapping attacks. To stop these types of attacks different techniques were proposed however they’re not enough to stop all varieties of attacks. The existing SQLIA prevention techniques can validate the client side data, one by one. It complicates the developer’s task to write different validation codes for each data receiving page in the server. This paper proposed an idea of XML based SQLIA prevention technique which can validate the entire client side data by one single call of the dedicated validation function. In this process, the client will submit data in XML format and the server will verify the entire incoming XML file, based on some pr-decided rules called data-rules.
Authors and Affiliations
Preshika Tiwari
A Review of Optical Character Recognition System forRecognition of Printed Text
Abstract: As we move ahead in technology advancements, from simple data processing, to intelligentcomputing, one area of research undergoing advancement, is the system of reading text characters on an image.Optical...
A Hybrid Approach for Performance Enhancement of VANETusing CSMA-MACA: a Review
Abstract: A wireless sensor network (WSNs) have increased gigantic consideration for their extensive varietyof utilization, for example, environmental checking, military consideration, medical services, fiascoadmin...
Secure Group Key Management using Ciphertext in MANETs
Abstract: The modern developments in Mobile AdhocNETworks (MANETs) suffer from efficient and secure broadcasting of messages to a distant system. The main obstacles for the secured information transfer are restricted com...
Adaptive Personalized Web Search with Safety Seclusion
Abstract: The Comprehensive research demonstrations the competence of our framework. We additionally give an online expectation component to choosing whether customizing a query is beneficial. Personalized web search (PW...
Performance Analysis of Aodv, Dsdv, Dsr and Lar Routing Protocols In Manet- A Review
Abstract: Mobile ad Hoc network is a collection of mobile nodes that communicate with each other using wireless links. A routing protocol is used to discover routes between nodes in order to facilitate communicatio...