Search Results/Filters    

Filters

Year

Banks




Expert Group










Full-Text


Issue Info: 
  • Year: 

    1400
  • Volume: 

    6
Measures: 
  • Views: 

    848
  • Downloads: 

    0
Abstract: 

اطلاعات بخش مهم و حیاتی در جوامع بشری و زندگی افراد می باشد. با توجه به پیشرفت تکنولوژی و همه گیر شدن استفاده از شبکه ی اینترنت، اکثر شرکت ها، ادارات و سازمان ها اطلاعات و خدمات خود را در بستر وب ارائه می دهند. همچنین به دلیل ارزشمند بودن این اطلاعات، همواره افراد و یا سازمان هایی وجود دارند که قصد سوء استفاده از این اطلاعات را دارند. در محیط وب، این داده ها اکثراً با استفاده از سیستم مدیریت پایگاه داده MySQL و یا MS-SQL Server و در پاره ای موارد پایگاه داده های دیگری نظیر Oracle و غیره، نگهداری و مدیریت می شوند. یکی از روش های متداول برای دسترسی غیر مجاز به این داده ها، استفاده از حملات SQL Injection است که در آن مهاجم با ارسال دستورات SQL و حتی کدهای JavaScript به سمت سرور داده، قصد مختل کردن فعالیت آنرا داشته و بواسطه ی این اختلال می تواند به اطلاعات پایگاه داده و حتی در گاهی مواقع به سرور نیز دسترسی داشته باشد. یکی از وظایف مدیر پایگاه داده، تشخیص و جلوگیری از بروز چنین حملاتی می باشد.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 848

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0
Author(s): 

Fadlil A. | Riadi I. | Mumin M.A.

Issue Info: 
  • Year: 

    2024
  • Volume: 

    37
  • Issue: 

    4
  • Pages: 

    635-645
Measures: 
  • Citations: 

    0
  • Views: 

    3
  • Downloads: 

    0
Abstract: 

SQL injection (SQLi) is one of the most common attacks against database Servers and has the potential to threaten Server services by utilizing SQL commands to change, delete, or falsify data. In this study, researchers tested SQLi attacks against websites using a number of tools, including Whois, SSL Scan, Nmap, Open Web Application Security Project (OWASP) Zap, and SQL Map. Then, researchers identified SQLi vulnerabilities on the tested web Server. Next, researchers developed and implemented mitigation measures to protect the website from SQLi attacks. Test results using OWASP Zap identified 14 vulnerabilities, with five of them at a medium level of 35%, seven at a low level of 50%, and two at an informational level of 14%. Meanwhile, testing using SQL Map succeeded in gaining access to the database and username on the web Server. The next step in this research is to provide recommendations for installing a firewall on the website as a mitigation measure to reduce the risk of SQLi attacks. The main contribution of this research is the development of a structured methodology to identify and address SQLi vulnerabilities in web Servers, which play an important role in maintaining data security and integrity in a rapidly evolving online environment.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 3

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Writer: 

Issue Info: 
  • End Date: 

    1395
Measures: 
  • Citations: 

    0
  • Views: 

    172
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 172

Issue Info: 
  • Year: 

    621
  • Volume: 

    15
  • Issue: 

    1
  • Pages: 

    137-150
Measures: 
  • Citations: 

    0
  • Views: 

    17
  • Downloads: 

    6
Abstract: 

The database management system (DBMS) for any application is crucial for developers because each application needs high performance to run efficiently. Therefore, database Benchmarking is the process of performing several Defined tests on those databases to evaluate their performance. The electronic benchmarking System (EBS) facilitates and improves human resource management (HRM) in all aspects of real life. EBS designed by four different database backends and three different web technology. This paper presents a comparative evaluation of the performance of the top DBMS systems namely (MySQL, SQL Server, Oracle, and MS Access). The middleware is designed using three dynamic web technologies (PHP, ASP, and PYTHON). In order to evaluate the backend performance for the four mentioned databases system by using two Parameters Response Time (RT) and Throughput (TT) over different Tire Architectures namely: One-Tier Architecture (1TA), Two-Tier Architecture (2TA). This paper will show which of the database has a better Response time (RT) and Throughput (TT).

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 17

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 6 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

YUE D. | YUE W. | YU J.

Journal: 

VIRTUAL

Issue Info: 
  • Year: 

    621
  • Volume: 

    1
  • Issue: 

    1
  • Pages: 

    230-244
Measures: 
  • Citations: 

    1
  • Views: 

    149
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 149

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2014
  • Volume: 

    4
  • Issue: 

    2
  • Pages: 

    151-165
Measures: 
  • Citations: 

    1
  • Views: 

    411
  • Downloads: 

    99
Abstract: 

A single Server finite population queueing model with compulsory Server vacation and with fixed batch service has been considered. For this model the system steady state probabilities are obtained. Some performance measures are calculated and numerical examples are also given.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 411

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 99 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2014
  • Volume: 

    2
  • Issue: 

    1 (5)
  • Pages: 

    83-97
Measures: 
  • Citations: 

    0
  • Views: 

    1051
  • Downloads: 

    0
Abstract: 

One of the most critical attacks, threatening the security of databases is SQL injection attack which is mostly held through web applications. This paper proposes a new method to detect and prevent SQL injection attack. The method is based on combination of both static and dynamic approaches and semantic analysis of queries. Run time queries are matched with static list and semantic pattern and as a result the degree of attack factor existence will be checked. Ontology is used on creation of semantic patterns. According to tests which are gathered from different databases, this method acts efficiently and flexibly enough to discover new attacks. The suggested architecture, in contrast with the others, is designed in such a way that it does not have a great database dependency and by some changes it can be used for the other databases.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1051

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2016
  • Volume: 

    2
Measures: 
  • Views: 

    549
  • Downloads: 

    338
Abstract: 

THE SIMULATION AND RESULT ANALYSIS OF INTEGRATED DATA WAREHOUSE FOR FINANCIAL INSTITUTE WITH SECURITY LEVELS HAS INTEGRATED WITH FINANCIAL TRANSACTION MODEL, DATA WAREHOUSE ARCHITECTURE FOR FINANCIAL INSTITUTE AND SECURITY MODEL [1][2][3]. THE SIMULATION AND RESULT ANALYSIS OF INTEGRATED DATA WAREHOUSE FOR FINANCIAL INSTITUTE WITH SECURITY LEVELS HAS DONE USING SQL Server MANAGEMENT STUDIO OF SQL Server 2008. THE DATA SOURCES LIKE BANK, INSURANCES, SHARES, BONDS, POST OFFICE, INCOME TAX, IMP/EXP AND LOANS DATA ARE TRANSFER BY ETL PROCESS TO DATA WAREHOUSE IN RESPECTIVE DATA MARTS. THE VARIOUS CHANNELS LIKE INCOME TAX DEPARTMENT, GOVERNMENT ACCOUNTANT AND AUDITORS, GOVERNMENT LEGAL REGULATORY AUTHORITY, ALL TAX DEPARTMENT AND OVERALL FINANCIAL SYSTEM WILL ACCESS DATA FROM DATA WAREHOUSE BY EXECUTING SQL QUERIES AS REQUIRE IN SIMULATION. THE DATA ACCESS FROM VARIOUS CHANNELS IS NOTHING BUT RESULTS OF SIMULATED SECURED INTEGRATED DATA WAREHOUSE ARCHITECTURE OF FINANCIAL INSTITUTE.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 549

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 338
Issue Info: 
  • Year: 

    2021
  • Volume: 

    13
  • Issue: 

    3
  • Pages: 

    1-9
Measures: 
  • Citations: 

    0
  • Views: 

    297
  • Downloads: 

    199
Abstract: 

The functionality of a web-based system can be a ected by many threats. In fact, web-based systems provide several services built on databases. This makes them prone to Structured Query Language (SQL) injection attacks. For that reason, many research e orts have been made to deal with such attacks. The majority of the protection techniques adopt a defense strategy which results to provide, in extreme response time, a lot of positive rates. Indeed, attacks by injecting SQL are always a serious challenge for the web-based system. This kind of attack is still attractive to hackers and it is in growing progress. For that reason, many researches have been proposed to deal with this issue. The proposed techniques are essentially based on a statistical or dynamic approach or using machine learning or even deep learning. This paper discusses and reviews the existing techniques used to detect and prevent SQL injection attacks. In addition, it outlines challenges, open issues, and future trends of solutions in this context.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 297

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 199 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button