A Multiple-Phased Modeling Method to Identify Potential Fraudsters in Online Auctions

  • Authors:
  • Wen-Hsi Chang;Jau-Shien Chang

  • Affiliations:
  • -;-

  • Venue:
  • ICCRD '10 Proceedings of the 2010 Second International Conference on Computer Research and Development
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

SQL Injection Attacks (SQLIAs) is one of the most serious threats to the security of database driven applications. In fact, it allows an attacker to gain control over the database of an application and consequently, an attacker may be able to alter data. Many surveys have addressed this problem. Also some researchers have proposed different approaches to detect and prevent this vulnerability but they are not successful completely. Moreover, some of these approaches have not implemented yet and users would be confused in choosing an appropriate tool. In this paper we present all SQL injection attack types and also different tools which can detect or prevent these attacks. Finally we evaluate these tools against all types of SQL injection attacks.