{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T11:42:39Z","timestamp":1725882159168},"publisher-location":"Singapore","reference-count":16,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811031526"},{"type":"electronic","value":"9789811031533"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-3153-3_67","type":"book-chapter","created":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T07:13:59Z","timestamp":1489648439000},"page":"673-680","source":"Crossref","is-referenced-by-count":1,"title":["SQLI Attacks: Current State and Mitigation in SDLC"],"prefix":"10.1007","author":[{"given":"Daljit","family":"Kaur","sequence":"first","affiliation":[]},{"given":"Parminder","family":"Kaur","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,17]]},"reference":[{"key":"67_CR1","unstructured":"SQL Inject Prevention cheat sheet, https:\/\/www.owasp.org\/index.php\/SQL_Injection_Prevention_Cheat_Sheet ."},{"key":"67_CR2","unstructured":"Protecting Websites from advanced and automated SQL injection, http:\/\/www.imperva.com\/docs\/WP_SQL_Injection20.pdf ."},{"key":"67_CR3","doi-asserted-by":"crossref","unstructured":"Torgby. W.K, Asabere, N.Y. Structured Query Language Injection (SQLI) Attacks: Detection and Prevention Techniques in Web Application Technologies. International Journal of Computer applications Vol. 71-No.11. 29\u201340.ISSN: 0975-8887. (2013).","DOI":"10.5120\/12404-8908"},{"key":"67_CR4","doi-asserted-by":"publisher","unstructured":"Kaur D, Kaur P. Empirical Analysis of Web Attacks. In Procedia of Computer Science. Elsevier Publications. DOI: 10.1016\/j.procs.2016.02.057 (2016).","DOI":"10.1016\/j.procs.2016.02.057"},{"key":"67_CR5","unstructured":"XAMPP, https:\/\/en.wikipedia.org\/wiki\/XAMPP ."},{"key":"67_CR6","unstructured":"Muniz J., Lakhani A. Web Penetration Testing with Kali Linux. PACKT Publishing. MUMBAI-India. (2013)."},{"key":"67_CR7","unstructured":"Gandhi M. and Baria J. SQL Injection Attacks in Web Application. International Journal of Soft computing and Engineering (IJSCE), Vol 2, Issue 6. 189\u2013191. ISSN:2231-2307. (2013.)."},{"key":"67_CR8","unstructured":"Parmar.G. and Mathur K. Proposed Preventive measures and strategies Against SQL injection Attacks. Indian Journal of Applied Research, Vol. 5, Issue 5. 664\u2013671. ISSN- 2249555X. (2015)."},{"key":"67_CR9","unstructured":"SQL Injection, https:\/\/www.us-cert.gov\/sites\/default\/files\/publications\/sql200901.pdf ."},{"key":"67_CR10","unstructured":"Madan.S. and Madan S. Bulwark Against SQL Injection attack \u2013 An Unified Approach. International Journal of Computer Science and Network Security(IJCSNS), Vol. 10 No.5. 305\u2013313. (2010)."},{"key":"67_CR11","unstructured":"Steps to Protect your Websites from SQL Injection attacks, https:\/\/www.whitehatsec.com\/resource\/whitepapers\/SQL.html ."},{"key":"67_CR12","doi-asserted-by":"publisher","unstructured":"Mahapatra and Khan. S. A Survey of SQL Injection Countermeasures, International Journal of Computer science & engineering (IJCSES) Vol. 3, No.3. 55\u201374. DOI: 10.5121\/ijcses.2012.3305 55. (2012).","DOI":"10.5121\/ijcses.2012.3305"},{"key":"67_CR13","unstructured":"Kalaria S. and Vivekanandan. M. Dark Side of SQL Injection. In the proceedings of ASAR International Conference, Bangalore. 67\u201372. ISBN: 978-81-927147-0-7. (2013)."},{"key":"67_CR14","unstructured":"Helford. W, Viegas. J. and Orso. A. 2006. A Classification of SQL Injection attacks and countermeasures. In the proceedings of the International symposium on secure software Engineering. Washington, USA (2006)."},{"key":"67_CR15","doi-asserted-by":"publisher","unstructured":"Gollmann. D. Securing Web Applications. Article\u2002in\u2002 ELSEVIER Information Security Technical Report Volume 13 Issue1. Elsevier Advanced Technology Publications Oxford, UK. 1\u20139.DOI: 10.1016\/j.istr.2008.02.002 .","DOI":"10.1016\/j.istr.2008.02.002"},{"key":"67_CR16","unstructured":"Aggarwal. U, Saxena. M. and Rana. K.S. A Survey of SQL Injection attacks. International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE), vol. 5, Issue 3. 286\u2013289. ISSN:2277128X. (2015)."}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-3153-3_67","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,19]],"date-time":"2019-09-19T20:31:37Z","timestamp":1568925097000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-3153-3_67"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811031526","9789811031533"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-3153-3_67","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017]]}}}