Analysis of the defending possibilities against SQL Injection attacks

  • Byzdra C
  • Kozieł G
N/ACitations
Citations of this article
6Readers
Mendeley users who have this article in their library.

Abstract

The article describes various protection methods of database and types of SQL Injection attacks. These are extremely dangerous attacks because they threaten the confidentiality of sensitive data. In order to analyze in detail protection methods and methods of attacks, simulations of attacks and defence were performed in the following languages: C #, PHP, Java. Based on the simulation results for particular languages, the effectiveness and efficiency of database protection methods were compared.

Cite

CITATION STYLE

APA

Byzdra, C., & Kozieł, G. (2019). Analysis of the defending possibilities against SQL Injection attacks. Journal of Computer Sciences Institute, 13, 339–344. https://doi.org/10.35784/jcsi.1329

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free