A guiding framework for enhancing database security in state-owned universities in Zimbabwe

Author(s):  
Zorodzai Magura ◽  
Tinashe Gwendolyn Zhou ◽  
Samuel Musungwini
Keyword(s):  
2003 ◽  
Author(s):  
Jeffrey Worst ◽  
R. Jason Weiss
Keyword(s):  

Author(s):  
Lin Dai ◽  
Shiyong Jin ◽  
Longjun Song ◽  
Shouchen Sun

1999 ◽  
Vol 91 (1-3) ◽  
pp. 119-126 ◽  
Author(s):  
Peter Horak ◽  
Ljiljana Branković ◽  
Mirka Miller

2021 ◽  
Vol 1 ◽  
pp. 84-90
Author(s):  
Rustam Kh. Khamdamov ◽  
◽  
Komil F. Kerimov ◽  

Web applications are increasingly being used in activities such as reading news, paying bills, and shopping online. As these services grow, you can see an increase in the number and extent of attacks on them, such as: theft of personal information, bank data and other cases of cybercrime. All of the above is a consequence of the openness of information in the database. Web application security is highly dependent on database security. Client request data is usually retrieved by a set of requests that request the application user. If the data entered by the user is not scanned very carefully, you can collect a whole host of types of attacks that use web applications to create security threats to the database. Unfortunately, due to time constraints, web application programmers usually focus on the functionality of web applications, but only few worry about security. This article provides methods for detecting anomalies using a database firewall. The methods of penetration and types of hacks are investigated. A database firewall is proposed that can block known and unknown attacks on Web applications. This software can work in various ways depending on the configuration. There are almost no false positives, and the overhead of performance is relatively small. The developed database firewall is designed to protect against attacks on web application databases. It works as a proxy, which means that requests for SQL expressions received from the client will first be sent to the developed firewall, rather than to the database server itself. The firewall analyzes the request: requests that are considered strange are blocked by the firewall and an empty result is returned to the client.


Sign in / Sign up

Export Citation Format

Share Document