A Proposed Architecture for Query Anomaly Detection and Prevention against SQL Injection Attacks

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of computer applications 2016-03, Vol.137 (7), p.11-14
Hauptverfasser: George, T.K., Jacob, Poulose
Format: Artikel
Sprache:eng
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 14
container_issue 7
container_start_page 11
container_title International journal of computer applications
container_volume 137
creator George, T.K.
Jacob, Poulose
description
doi_str_mv 10.5120/ijca2016908808
format Article
fullrecord <record><control><sourceid>crossref</sourceid><recordid>TN_cdi_crossref_primary_10_5120_ijca2016908808</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>10_5120_ijca2016908808</sourcerecordid><originalsourceid>FETCH-LOGICAL-c798-e54da398eeaa7b1831335714ede5b932e4c8d260d5945214462620c30654071e3</originalsourceid><addsrcrecordid>eNpVUEtPAjEYbIwmEuTquX9gse_HcYMvEhIkcl9L-63uCl3SLib774XAQecyM5n5vsMgdE_JVFJGHprWO0aossQYYq7QiFgtC2OMvv6jb9Ek55YcwS1TVozQR4nfUrfvMgRcJv_V9OD7QwJcdwmvDpAGXMZu57YDfoRT1nQRuxiOV_AD8Ww_XRNzj99XCzyP7aVU9r3z3_kO3dRum2Fy4TFaPz-tZ6_FYvkyn5WLwmtrCpAiOG4NgHN6Qw2nnEtNBQSQG8sZCG8CUyRIKySjQiimGPGcKCmIpsDHaHp-61OXc4K62qdm59JQUVKdFqr-L8R_AcqBWRc</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>A Proposed Architecture for Query Anomaly Detection and Prevention against SQL Injection Attacks</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>George, T.K. ; Jacob, Poulose</creator><creatorcontrib>George, T.K. ; Jacob, Poulose</creatorcontrib><identifier>ISSN: 0975-8887</identifier><identifier>EISSN: 0975-8887</identifier><identifier>DOI: 10.5120/ijca2016908808</identifier><language>eng</language><ispartof>International journal of computer applications, 2016-03, Vol.137 (7), p.11-14</ispartof><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27922,27923</link.rule.ids></links><search><creatorcontrib>George, T.K.</creatorcontrib><creatorcontrib>Jacob, Poulose</creatorcontrib><title>A Proposed Architecture for Query Anomaly Detection and Prevention against SQL Injection Attacks</title><title>International journal of computer applications</title><issn>0975-8887</issn><issn>0975-8887</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><recordid>eNpVUEtPAjEYbIwmEuTquX9gse_HcYMvEhIkcl9L-63uCl3SLib774XAQecyM5n5vsMgdE_JVFJGHprWO0aossQYYq7QiFgtC2OMvv6jb9Ek55YcwS1TVozQR4nfUrfvMgRcJv_V9OD7QwJcdwmvDpAGXMZu57YDfoRT1nQRuxiOV_AD8Ww_XRNzj99XCzyP7aVU9r3z3_kO3dRum2Fy4TFaPz-tZ6_FYvkyn5WLwmtrCpAiOG4NgHN6Qw2nnEtNBQSQG8sZCG8CUyRIKySjQiimGPGcKCmIpsDHaHp-61OXc4K62qdm59JQUVKdFqr-L8R_AcqBWRc</recordid><startdate>20160317</startdate><enddate>20160317</enddate><creator>George, T.K.</creator><creator>Jacob, Poulose</creator><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20160317</creationdate><title>A Proposed Architecture for Query Anomaly Detection and Prevention against SQL Injection Attacks</title><author>George, T.K. ; Jacob, Poulose</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c798-e54da398eeaa7b1831335714ede5b932e4c8d260d5945214462620c30654071e3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><toplevel>online_resources</toplevel><creatorcontrib>George, T.K.</creatorcontrib><creatorcontrib>Jacob, Poulose</creatorcontrib><collection>CrossRef</collection><jtitle>International journal of computer applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>George, T.K.</au><au>Jacob, Poulose</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Proposed Architecture for Query Anomaly Detection and Prevention against SQL Injection Attacks</atitle><jtitle>International journal of computer applications</jtitle><date>2016-03-17</date><risdate>2016</risdate><volume>137</volume><issue>7</issue><spage>11</spage><epage>14</epage><pages>11-14</pages><issn>0975-8887</issn><eissn>0975-8887</eissn><doi>10.5120/ijca2016908808</doi><tpages>4</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0975-8887
ispartof International journal of computer applications, 2016-03, Vol.137 (7), p.11-14
issn 0975-8887
0975-8887
language eng
recordid cdi_crossref_primary_10_5120_ijca2016908808
source EZB-FREE-00999 freely available EZB journals
title A Proposed Architecture for Query Anomaly Detection and Prevention against SQL Injection Attacks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-14T04%3A28%3A19IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Proposed%20Architecture%20for%20Query%20Anomaly%20Detection%20and%20Prevention%20against%20SQL%20Injection%20Attacks&rft.jtitle=International%20journal%20of%20computer%20applications&rft.au=George,%20T.K.&rft.date=2016-03-17&rft.volume=137&rft.issue=7&rft.spage=11&rft.epage=14&rft.pages=11-14&rft.issn=0975-8887&rft.eissn=0975-8887&rft_id=info:doi/10.5120/ijca2016908808&rft_dat=%3Ccrossref%3E10_5120_ijca2016908808%3C/crossref%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true