The article describes various protection methods of database and types of SQL Injection attacks. These are extremely dangerous attacks because they threaten the confidentiality of sensitive data. In order to analyze in detail protection methods and methods of attacks, simulations of attacks and defence were performed in the following languages: C #, PHP, Java. Based on the simulation results for particular languages, the effectiveness and efficiency of database protection methods were compared.
CITATION STYLE
Byzdra, C., & Kozieł, G. (2019). Analysis of the defending possibilities against SQL Injection attacks. Journal of Computer Sciences Institute, 13, 339–344. https://doi.org/10.35784/jcsi.1329
Mendeley helps you to discover research relevant for your work.