View Article |
SQL-injection vulnerabilities resolving using valid security tool in cloud
Singh, Niharika1, Singh, Ashutosh Kumar2.
The cloud is storing a huge amount of the data, including personal and confidential
details. It involves the third party over the internet and proposes many unreliable strings
which can be proven as loopholes. Thus, securing the data in the cloud tends to be a
major point of concern. SQL Injection Attacks (SQLIAs) are being acknowledged as
one of the foremost web applications security threats. It initiates a vulnerable query to
destroy the connected server systems and help attackers with unauthorized access to the
databases resulting in identity theft and security violations. The paper proposes a hybrid
solution whose information utility is higher than the solutions that are being proposed
earlier. As the methodology is concerned over static, dynamic and runtime detection and
prevention mechanism. It also classifies the malicious queries and inspires the system to
be well prepared for the secure working environment by implementing a demonstration
design. Through the experimental implementation, the query associativity makes success
probability of 0.775 using the associativity formula that in fraction, results in a durable
comparative solution proposed till date.
Affiliation:
- National Institute of Technology Kurukshetra, India
- National Institute of Technology Kurukshetra, India
Download this article (This article has been downloaded 169 time(s))
|
|
Indexation |
Indexed by |
MyJurnal (2021) |
H-Index
|
3 |
Immediacy Index
|
0.000 |
Rank |
0 |
Indexed by |
Scopus 2020 |
Impact Factor
|
CiteScore (1.1) |
Rank |
Q3 (Agricultural and Biological Sciences (all)) Q3 (Environmental Science (all)) Q3¬¬- (Computer Science (all)) Q3 (Chemical Engineering (all)) |
Additional Information |
SJR (0.174) |
|
|
|