Analysis and Prevention of SQL Injection based on Web

Authors

  • Junfeng Li Jincheng College, Sichuan University, School of computer and software, Chengdu 611731, Sichuan, China

DOI:

https://doi.org/10.53469/jtpes.2024.04(09).05

Keywords:

SQL injection, Web security, Defense measures

Abstract

With the continuous development of the network, individual or collective data are constantly generated and stored in the computer. If more private information is leaked or stolen, it will bring serious harm to individuals, families and even society. How to protect personal privacy or the security of system applications has become a top priority. Hackers on the Internet use the attack principle of different means to crack or "steal" and other malicious acts. SQL injection can be seen everywhere now, and it is also a common attack method. Knowing its principle can help us effectively prevent malicious attacks in this part.

References

Wu, Z. (2024). An Efficient Recommendation Model Based on Knowledge Graph Attention-Assisted Network (KGATAX). arXiv preprint arXiv:2409.15315.

Wu, Z. (2024). MPGAAN: Effective and Efficient Heterogeneous Information Network Classification. Journal of Computer Science and Technology Studies, 6(4), 08-16.

Wu, Z., Wang, X., Huang, S., Yang, H., & Ma, D. (2024). Research on Prediction Recommendation System Based on Improved Markov Model. Advances in Computer, Signals and Systems, 8(5), 87-97.

Yan, H., Wang, Z., Xu, Z., Wang, Z., Wu, Z., & Lyu, R. (2024). Research on image super-resolution reconstruction mechanism based on convolutional neural network. arXiv preprint arXiv:2407.13211.

Jiang, L., Yu, C., Wu, Z., & Wang, Y. (2024). Advanced AI framework for enhanced detection and assessment of abdominal trauma: Integrating 3D segmentation with 2D CNN and RNN models. arXiv preprint arXiv:2407.16165.

Zhu, Z., Wang, Z., Wu, Z., Zhang, Y., & Bo, S. (2024). Adversarial for Sequential Recommendation Walking in the Multi-Latent Space. Applied Science and Biotechnology Journal for Advanced Research, 3(4), 1-9.

Wu, X., Wu, Y., Li, X., Ye, Z., Gu, X., Wu, Z., & Yang, Y. (2024). Application of adaptive machine learning systems in heterogeneous data environments. Global Academic Frontiers, 2(3), 37-50.

Shen, Z. (2023). Algorithm Optimization and Performance Improvement of Data Visualization Analysis Platform based on Artificial Intelligence. Frontiers in Computing and Intelligent Systems, 5(3), 14-17.

Zheng Ren, "Balancing role contributions: a novel approach for role-oriented dialogue summarization," Proc. SPIE 13259, International Conference on Automation Control, Algorithm, and Intelligent Bionics (ACAIB 2024), 1325920 (4 September 2024); https://doi.org/10.1117/12.3039616

Z. Ren, "Enhancing Seq2Seq Models for Role-Oriented Dialogue Summary Generation Through Adaptive Feature Weighting and Dynamic Statistical Conditioninge," 2024 6th International Conference on Communications, Information System and Computer Engineering (CISCE), Guangzhou, China, 2024, pp. 497-501, doi: 10.1109/CISCE62493.2024.10653360.

Downloads

Published

2024-10-08

How to Cite

Li, J. (2024). Analysis and Prevention of SQL Injection based on Web. Journal of Theory and Practice of Engineering Science, 4(09), 35–38. https://doi.org/10.53469/jtpes.2024.04(09).05