شماره ركورد كنفرانس :
4753
عنوان مقاله :
Optimization of Multi-Agent Security Solution for Prevent Web-Based System of SQL Injection Attack
عنوان به زبان ديگر :
Optimization of Multi-Agent Security Solution for Prevent Web-Based System of SQL Injection Attack
پديدآورندگان :
Safaei Sadegh Mohammad Saeid saeidsafaei@gmail.com Islamic Azad University, Ashtian , Zarafshan Faraneh Islamic Azad University, Ashtian , Safari Maryam Islamic Azad University, Ashtian , Rahimian Abouzar Islamic Azad University, Ashtian
تعداد صفحه :
15
كليدواژه :
SQL Injection , Bug patching , Infiltration , Error , HTAccess. , Logging
سال انتشار :
1397
عنوان كنفرانس :
اولين كنفرانس بين المللي محاسبات و سامانه هاي توزيع شده
زبان مدرك :
انگليسي
چكيده فارسي :
In this paper, after the implicit familiarity with malicious instructions called SQL Database, it has been tried to introduce multiple - way works to prevent infiltration into the Database. Using some innovative ideas and combining some algorithms, it has been tried to close the influence of penetration and seek to display the information of the database to the destructive person. An example of a Web scenario is given in PHP, and ways to penetrate it are displayed through an SQL attack, and then using reverse engineering to address the Attacker s goals, it is designed to capture the remaining traces of the attacker in order to take the necessary measures to capture or prevent the attacker from entering into an Attacker s IP address.
چكيده لاتين :
In this paper, after the implicit familiarity with malicious instructions called SQL Database, it has been tried to introduce multiple - way works to prevent infiltration into the Database. Using some innovative ideas and combining some algorithms, it has been tried to close the influence of penetration and seek to display the information of the database to the destructive person. An example of a Web scenario is given in PHP, and ways to penetrate it are displayed through an SQL attack, and then using reverse engineering to address the Attacker s goals, it is designed to capture the remaining traces of the attacker in order to take the necessary measures to capture or prevent the attacker from entering into an Attacker s IP address.
كشور :
ايران
لينک به اين مدرک :
بازگشت