Share This Article:

Review and Measuring the Efficiency of SQL Injection Method in Preventing E-Mail Hacking

Abstract Full-Text HTML Download Download as PDF (Size:196KB) PP. 337-342
DOI: 10.4236/ijcns.2012.56044    3,826 Downloads   6,695 Views   Citations

ABSTRACT

E-mail hackers use many methods in their work, in this article, most of such efficient methods are demonstrated and compared. Different methods and stages of such methods are listed here, in order to reveal such methods and to take care of them but the most common discussed method in this paper is SQL method. SQL injection is a type of security exploit in which the attacker adds SQL statements through a web application's input fields or hidden parameters to gain access to resources or make changes to data. It is found that the SQL is an efficient way in preventing E-mail hacking and its efficiency reaches about 80%. The method of SQL injection can be considered as an efficient way comparing with other methods.

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

A. Sharadqeh, A. Alnaser, O. Heyasat, A. Abu-Ein and H. Hatamleh, "Review and Measuring the Efficiency of SQL Injection Method in Preventing E-Mail Hacking," International Journal of Communications, Network and System Sciences, Vol. 5 No. 6, 2012, pp. 337-342. doi: 10.4236/ijcns.2012.56044.

References

[1] C. Cerrudo, “Manipulating Microsoft SQL Server Using SQL Injection,” Application Security, Inc., 2005. http://research.mwjournal.com/detail/RES/1124462486_292.html
[2] D. Das, U. Sharma and D. K. Bhattacharyya, “An Approach to Detection of SQL Injection Attack Based on Dynamic Query Matching,” International Journal of Computer Applications, Vol. 1, No. 25, 2010, pp. 28-34.
[3] G. B. Shelly, T. J. Cashman and M. E. Vermaat, “Discovering Computers 2005: A Gateway to Information,” Course Technology, Boston, 2004.
[4] K. Stasiak, “Web Application Security,” Information Systems Control Journal, Vol. 6, 2002. http://www.isaca.org/Content/ContentGroups/Journal1/20023/Web_Application_Security.htm
[5] P. Carey, “Creating Web Pages with HTML and Dynamic HTML,” Course Technology, Boston, 2001.
[6] M. Roche, “Wireless Hacking Tools,” 2007. http://www.cse.wustl.edu/~jain/cse57107/ftp/wireless_hacking/2007
[7] S. Garfenkel and G. Spafford, “Secure AGI/CGI Programming,” World Wide Web Journal, Vol. 2, No. 3, 1997. http://www.w3j.com/7/s3.garfinkel.wrap.html.
[8] W. Ke, M. Muthuprasanna and S. Kothari, “Preventing SQL Injection Attacks in Stored Procedures,” Proceedings of the Australian Software Engineering Conference, Brisbane, 31 March-1 April 2005, pp. 191-1978.
[9] F. M. Pinguelo and B. W. Muller, “Virtual Crimes, Real Damages Part II,” Virginia Journal of Law & Technology, Vol. 17, No. 1, 2010.

  
comments powered by Disqus

Copyright © 2018 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.