{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T06:23:20Z","timestamp":1766298200700},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030242671"},{"type":"electronic","value":"9783030242688"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24268-8_18","type":"book-chapter","created":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T19:03:34Z","timestamp":1563390214000},"page":"191-201","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Research on SQL Injection and Defense Technology"],"prefix":"10.1007","author":[{"given":"Zongshi","family":"Chen","sequence":"first","affiliation":[]},{"given":"Mohan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xiang","family":"Cui","sequence":"additional","affiliation":[]},{"given":"Yanbin","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"key":"18_CR1","unstructured":"Tan, J.: OWASP releases top ten web application security risks. Comput. Netw. (23), 52\u201353(2017)"},{"issue":"3","key":"18_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1201\/1079\/43272.28.3.20000901\/30627.2","volume":"28","author":"FR Puppy","year":"2000","unstructured":"Puppy, F.R.: How I hacked PacketStorm: a look at hacking WWW threads by means of SQL\u2014part 2. EDPACS 28(3), 1\u20136 (2000)","journal-title":"EDPACS"},{"issue":"1","key":"18_CR3","first-page":"095","volume":"55","author":"J Cheng","year":"2018","unstructured":"Cheng, J., Xu, R., Tang, X., Sheng, V.S., Cai, C., et al.: An abnormal network flow feature sequence prediction approach for DDoS attacks detection in big data environment. Comput. Mater. Continua 55(1), 095\u2013119 (2018)","journal-title":"Comput. Mater. Continua"},{"key":"18_CR4","unstructured":"Ou, X., Yang, S.: Study on the principle and prevention technology of SQL injection attack. Digital Technol. Appl. (04), 216 (2016)"},{"key":"18_CR5","unstructured":"Halfond, W.G., Viegas, J., Orso, A.: A classification of SQL-injection attacks and countermeasures. In: IEEE International Symposium on Secure Software Engineering, vol. 1, pp. 13\u201315, March 2006"},{"key":"18_CR6","volume-title":"SQL Injection Attack and Defense","author":"H Shi","year":"2013","unstructured":"Shi, H., Ye, W.: SQL Injection Attack and Defense, 2nd edn. Tsinghua University Press, Beijing (2013)","edition":"2"},{"key":"18_CR7","unstructured":"Xu, J.: SQL injection attack principle and application in database security. Comput. Program. Skills Maint. (18), 104\u2013106(2009)"},{"key":"18_CR8","unstructured":"Bo, Z.: Research on SQL injection attack and detection technology. Inf. Secur. Commun. Secur. (5), 90\u201392 (2010)"},{"key":"18_CR9","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.ins.2011.06.020","volume":"231","author":"\u00c1 Herrero","year":"2013","unstructured":"Herrero, \u00c1., Corchado, E., Bajo, J., Pinz\u00f3n, C.I., De Paz, J.F., Corchado, J.M.: idMAS-SQL: intrusion detection based on MAS to detect and block SQL injection through data mining. Inf. Sci. 231, 15\u201331 (2013)","journal-title":"Inf. Sci."},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Kieyzuna, A., Guo, P.J., Jayaraman, K, et al.: Automatic creation of SQL injection and cross-site scripting attacks. In: Proceedings of the 31st International Conference on Software Engineering (ICSE), pp. 199\u2013209. IEEE Computer Society, Washington, DC (2009)","DOI":"10.1109\/ICSE.2009.5070521"},{"key":"18_CR11","unstructured":"Ollmann, G.: Second-order code injection attacks. Technical report. NGSSoftware Insight Security Research (2004)"},{"key":"18_CR12","unstructured":"Fu, X., Gong, X.: A general encoding method for solving SQL injection vulnerabilities. J. Yancheng Inst. Technol.: Nat. Sci. Ed. (1), 5\u20138(2015)"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"Muthuprasanna, M., Wei, K., Kothari, S.: Eliminating SQL injection attacks - a transparent defense mechanism. In: Eighth IEEE International Symposium on Web Site Evolution. IEEE Computer Society (2006)","DOI":"10.1109\/WSE.2006.9"},{"key":"18_CR14","unstructured":"Min, W., Kun, L.: An improved eliminating SQL injection attacks based regular expressions matching. In: International Conference on Control Engineering & Communication Technology. IEEE Computer Society (2012)"},{"key":"18_CR15","unstructured":"Balasundram, I., Ramaraj, E.: An Authentication scheme for Preventing SQL Injection Attack Using Hybrid Encryption (PSQL1-HBE) 53(3), 359\u2013368 (2011). ISSN 1450-216 X"},{"key":"18_CR16","doi-asserted-by":"crossref","unstructured":"Mittal, P., Jena, S.K.: A fast and secure way to prevent SQL injection attacks. In: Information & Communication Technologies. IEEE (2013)","DOI":"10.1109\/CICT.2013.6558190"},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Duhan, N., Saneja, B.: A two tier defense against SQL injection. In: International Conference on Signal Propagation & Computer Technology. IEEE (2014)","DOI":"10.1109\/ICSPCT.2014.6884906"},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"Voitovych, O.P., Yuvkovetskyi, O.S., Kupershtein, L.M.: SQL injection prevention system. In: Radio Electronics & Info Communications. IEEE (2016)","DOI":"10.1109\/UkrMiCo.2016.7739642"},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"Lin, J.C., Chen, J.M., Liu, C.H.: An automatic mechanism for sanitizing malicious injection. In: International Conference for Young Computer Scientists. IEEE (2008)","DOI":"10.1109\/ICYCS.2008.182"},{"key":"18_CR20","unstructured":"Qi, C.: Web security development: SQL injection attacks and web page hanging horses. Programmer (7), 102\u2013104 (2008)"},{"issue":"3","key":"18_CR21","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1016\/j.commatsci.2018.04.017","volume":"56","author":"H Zhang","year":"2018","unstructured":"Zhang, H., Yi, Y., Wang, J., Cao, N., Duan, Q., et al.: Network security situation awareness framework based on threat intelligence. Comput. Mater. Continua 56(3), 381\u2013399 (2018)","journal-title":"Comput. Mater. Continua"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24268-8_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T19:09:01Z","timestamp":1563390541000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24268-8_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030242671","9783030242688"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24268-8_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}