Author:
Kareem Fairoz Q.,Ameen Siddeeq Y.,Salih Azar Abid,Ahmed Dindar Mikaeel,Kak Shakir Fattah,Yasin Hajar Maseeh,Ibrahim Ibrahim Mahmood,Ahmed Awder Mohammed,Rashid Zryan Najat,Omar Naaman
Abstract
The vulnerabilities in most web applications enable hackers to gain access to confidential and private information. Structured query injection poses a significant threat to web applications and is one of the most common and widely used information theft mechanisms. Where hackers benefit from errors in the design of systems or existing gaps by not filtering the user's input for some special characters and symbols contained within the structural query sentences or the quality of the information is not checked, whether it is text or numerical, which causes unpredictability of the outcome of its implementation. In this paper, we review PHP techniques and other techniques for protecting SQL from the injection, methods for detecting SQL attacks, types of SQL injection, causes of SQL injection via getting and Post, and prevention technology for SQL vulnerabilities.
Publisher
Sciencedomain International
Cited by
17 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献