Detecting SQL injection attacks using SNORT IDS

@article{Alnabulsi2014DetectingSI,
  title={Detecting SQL injection attacks using SNORT IDS},
  author={Hussein Alnabulsi and Md. Rafiqul Islam and Quazi Mamun},
  journal={Asia-Pacific World Congress on Computer Science and Engineering},
  year={2014},
  pages={1-7}
}
SQL injection attack poses a serious security threats among the Internet community nowadays and it's continue to increase exploiting flaws found in the Web applications. In SQL injection attack, the attackers can take advantage of poorly coded web application software to introduce malicious code into the system and/or could retrieve important information. Web applications are under siege from cyber criminals seeking to steal confidential information and disable or damage the services offered by… CONTINUE READING

References

Publications referenced by this paper.
Showing 1-10 of 16 references

Textual Manipulation for SQL Injection Attacks”, In

  • H. ALNabulsi, I. Alsmadi, M. Al-Jarrah
  • J. of Computer Network and Information Security…
  • 2014
Highly Influential
3 Excerpts

Writing Secure Code”, Microsoft Press, Redmond, Washington, second edition,Vol

  • M. Howard, D. LeBlanc
  • Issue
  • 2003
Highly Influential
3 Excerpts

Translating Snort rules to STATL scenarios

  • S. Eckmann
  • In Proc. Recent Advances in Intrusion Detection,
  • 2001
Highly Influential
3 Excerpts

Textual Manipulation for SQL Injection Attacks ”

  • H. ALNabulsi, I. Alsmadi, M. Al-Jarrah
  • 2014

Database SQL Injections Detection & Protection

  • G. Veerman, R. Oprea
  • University van Amsterdam, May
  • 2012
1 Excerpt

Kothekar, "Honeyweb: a web-based high interaction client honeypot

  • S. Patil, Y. N. Karhade
  • International Journal of Engineering Research and…
  • 2012
1 Excerpt

R.K.A survey on SQL injection attacks, detection and prevention techniques

  • P. Kumar
  • First International Conference,
  • 2012
2 Excerpts

Rule Generalisation using Snort ”

  • J. Twycross U. Aickelin, T. HeskethRoberts
  • 2012

SQL Injection Detection with Composite Kernel in Support Vector Machine

  • Y. Wang, Z. Li
  • Journal of Security and Its Applications Vol. 6,
  • 2012
1 Excerpt

A Static Analysis Tool for Detecting Web Application Injection Vulnerabilities for ASP Program

  • Z. Xin-hua, W. Zhi-jian
  • Issue 1,
  • 2010
1 Excerpt

Similar Papers

Loading similar papers…