完整後設資料紀錄
DC 欄位語言
dc.contributor.authorKao, Da-Yuen_US
dc.contributor.authorLai, Chung-Juien_US
dc.contributor.authorSu, Ching-Weien_US
dc.date.accessioned2019-04-02T06:04:36Z-
dc.date.available2019-04-02T06:04:36Z-
dc.date.issued2018-01-01en_US
dc.identifier.issn1062-922Xen_US
dc.identifier.urihttp://dx.doi.org/10.1109/SMC.2018.00483en_US
dc.identifier.urihttp://hdl.handle.net/11536/151110-
dc.description.abstractWeb applications provide information for various private organizations and public sectors. The flaws in web-based application and database can also be utilized for malicious SQL statements. Aggressors often exploit SQL injection (SQLi) flaws during an input validation of web applications to infect database servers and launch cyber-attacks. SQLi attacks derive from the execution of an untrusted input and make the program execute unintended codes with administrative privileges. Website administrators should mitigate SQLi vulnerabilities and LEAs should find a better way to collect relevant evidence. This paper proposes a framework of SQLi Investigation Architecture (SIA) and proves its feasibility in fighting against of SQLi attacks. An effective and efficient approach is also proposed to prosecute SQLi aggressors and keep them away from abusing the database.en_US
dc.language.isoen_USen_US
dc.subjectSQL Injectionen_US
dc.subjectCybercrime Investigationen_US
dc.subjectDigital Forensicsen_US
dc.titleA Framework for SQL Injection Investigations.. Detection, Investigation, and Forensicsen_US
dc.typeProceedings Paperen_US
dc.identifier.doi10.1109/SMC.2018.00483en_US
dc.identifier.journal2018 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC)en_US
dc.citation.spage2838en_US
dc.citation.epage2843en_US
dc.contributor.department科技管理研究所zh_TW
dc.contributor.departmentInstitute of Management of Technologyen_US
dc.identifier.wosnumberWOS:000459884802149en_US
dc.citation.woscount0en_US
顯示於類別:會議論文