Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of Changsha University》 2013-05
Add to Favorite Get Latest Update

Research on SQL Injection Attacks to Databases and Defense Technology

YANG Xingwei;YANG Haojie;He'nan Quality Polytechnic;Railway Police College;  
SQL injection attacks are a common form of attacking website databases with extensive harms.Based on the thorough study of SQL injection attacks,various techniques and methods of SQL injection attacks are summarized.Several effective measures for defending against SQL injection attacks are provided from the application-level and system-level.
【CateGory Index】: TP311.13
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【Citations】
Chinese Journal Full-text Database 1 Hits
1 CHEN Xiao-bing1,ZHANG Han-yu2,LUO Li-ming2,HUANG He1 1.College of Software,Beihang University,Beijing 100083,China 2.College of Information Engineering,Capital Normal University,Beijing 100081,China;Research on technique of SQL injection attacks and detection[J];Computer Engineering and Applications;2007-11
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 Liang Ling;Research on SQL Injection Attack and Prevention Approach[J];Computer Development & Applications;2009-12
2 YU Xiao-yi 1 , CHANG Yan 2 , XU Han-wei 3 ( 1. Dalian University of Technology Library, Dalian 116024, Dalian,P.R.China; 2. Liaoning Police Academy; Dalian 116033,P.R. China; 3.Dalian Yuandong Digital Company Limited, Dalian 116001, P.R.China);THE Research and Realization of the Attack Defense on the Web Application[J];Computer Security;2008-06
3 XU Wei-cheng,DONG Xiao-jun(Zhongnan University of Economics and Law,Wuhan,Hubei 430073,China);Research on Security of Web Site Based on Object-oriented Database[J];Computer Security;2010-06
4 Li Zhiwen (Department of State Authorities and Institutions Abroad Services Council,Beijng 100701,China);To Achieve Personnel Information Management Methods with SQL SERVER Database on B/S Structure[J];Computer CD Software and Applications;2012-03
5 WANG Yu1,LIU Jun1,LI Yuan1,WANG Xing-wei2(1.Networking Center,Northeastern University,Shenyang 110004,China 2.CERNET Northeastern Networking Center,Northeastern University,Shenyang 110004,China;Web security monitoring and alarm system based on page analysis[J];Journal of Guangxi University(Natural Science Edition);2011-S1
6 Yin Guofu(Department of Computer Science,Weinan Teachers College,Weinan 714000,Shaanxi China);Research on Technique of Detection Based on SQL Injection[J];Henan Science;2009-03
7 Wang Xianggang(Department of Information Economics,Shenzhen Institute of Information Technology,Shenzhen 518029);An Automated Mechanism of Preventing SQL Injection Attack[J];Computer & Digital Engineering;2010-02
8 PENG Geng,FAN Ming-yu(School of Computer Science & Engineering,University of Electronic Science & Technology of China,Chengdu 610054,China);SQL injection detection based on improved Web crawler[J];Application Research of Computers;2010-07
9 Xie Haihui Zhong Qi(Gannan Normal University,Jiangxi Ganzhou 341000);Research of SQL Injection Attack and Prevention Technology[J];Science Mosaic;2010-05
10 HE Yan-li(Zhongzhou University,Zhengzhou 450044,China);General Solution for Server-level SQL Injection Vulnerability[J];Coal Technology;2011-06
China Proceedings of conference Full-text Database 3 Hits
1 Wang Ni-Hong,Fang Zhou (Northeast Forestry University information and computer engineering college, Harbin 150040);The research of common method and defense strategy of SQL injection attack on the network[A];[C];2007
2 LU Jun LIU Zhi-hui ZHENG Shi-hui (the Information Security center of Beijing University Of Posts and Telecommunications,Beijing 100876);SQL Injection and Analysis and Improvement of its Prevention Model[A];[C];2010
3 DAI Yingchun,ZHAO Zhongwen Academy of Equipment,Beijing 101416,China;Vulnerability classification based on information security attributes[A];[C];2012
【Secondary Citations】
Chinese Journal Full-text Database 2 Hits
1 Xu,Lou Yao,Guoxiang(Center of Network, Jnu University, GuangZhou 710632,China);A Method Of Preventing SQL Injection Attack And It's Usage[J];;2006-09
2 ZHANG Yong 1, LI Li 1,XUE Qian 2 (1.Institute of Earth Environment, State Key Laboratory of Loess and Quaternary Geology, Chinese Academy of Sciences, Xi′an,710075, China; 2.Shaanxi College of Communication Technology, Xi′an,710021, China);Detection and Defense Against SQL Injection Attacks[J];Modern Electronic Technique;2004-15
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved