{"id":"https://openalex.org/W3093500693","doi":"https://doi.org/10.1109/icccnt49239.2020.9225575","title":"Code-based Analysis Approach to Detect and Prevent SQL Injection Attacks","display_name":"Code-based Analysis Approach to Detect and Prevent SQL Injection Attacks","publication_year":2020,"publication_date":"2020-07-01","ids":{"openalex":"https://openalex.org/W3093500693","doi":"https://doi.org/10.1109/icccnt49239.2020.9225575","mag":"3093500693"},"language":"en","primary_location":{"id":"doi:10.1109/icccnt49239.2020.9225575","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt49239.2020.9225575","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058352591","display_name":"Angshuman Jana","orcid":"https://orcid.org/0000-0003-1044-7765"},"institutions":[{"id":"https://openalex.org/I4210089896","display_name":"Indian Institute of Information Technology Guwahati","ror":"https://ror.org/00bb9ch64","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210089896"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Angshuman Jana","raw_affiliation_strings":["Indian Institute of Information Technology, Guwahati, India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Information Technology, Guwahati, India","institution_ids":["https://openalex.org/I4210089896"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111255966","display_name":"Dipendu Maity","orcid":null},"institutions":[{"id":"https://openalex.org/I4210089896","display_name":"Indian Institute of Information Technology Guwahati","ror":"https://ror.org/00bb9ch64","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210089896"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Dipendu Maity","raw_affiliation_strings":["Indian Institute of Information Technology, Guwahati, India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Information Technology, Guwahati, India","institution_ids":["https://openalex.org/I4210089896"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5058352591"],"corresponding_institution_ids":["https://openalex.org/I4210089896"],"apc_list":null,"apc_paid":null,"fwci":0.8007,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.80810348,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9909999966621399,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/sql-injection","display_name":"SQL injection","score":0.890119194984436},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8886487483978271},{"id":"https://openalex.org/keywords/sql","display_name":"SQL","score":0.6018090844154358},{"id":"https://openalex.org/keywords/stored-procedure","display_name":"Stored procedure","score":0.5709339380264282},{"id":"https://openalex.org/keywords/web-application","display_name":"Web application","score":0.48927661776542664},{"id":"https://openalex.org/keywords/language-integrated-query","display_name":"Language Integrated Query","score":0.4856466054916382},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.48480215668678284},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4320589601993561},{"id":"https://openalex.org/keywords/null","display_name":"Null (SQL)","score":0.4171476662158966},{"id":"https://openalex.org/keywords/query-by-example","display_name":"Query by Example","score":0.4129437208175659},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.33446672558784485},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.23336514830589294},{"id":"https://openalex.org/keywords/web-search-query","display_name":"Web search query","score":0.14403817057609558}],"concepts":[{"id":"https://openalex.org/C150451098","wikidata":"https://www.wikidata.org/wiki/Q506059","display_name":"SQL injection","level":5,"score":0.890119194984436},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8886487483978271},{"id":"https://openalex.org/C510870499","wikidata":"https://www.wikidata.org/wiki/Q47607","display_name":"SQL","level":2,"score":0.6018090844154358},{"id":"https://openalex.org/C154420247","wikidata":"https://www.wikidata.org/wiki/Q846619","display_name":"Stored procedure","level":5,"score":0.5709339380264282},{"id":"https://openalex.org/C118643609","wikidata":"https://www.wikidata.org/wiki/Q189210","display_name":"Web application","level":2,"score":0.48927661776542664},{"id":"https://openalex.org/C179531526","wikidata":"https://www.wikidata.org/wiki/Q595637","display_name":"Language Integrated Query","level":5,"score":0.4856466054916382},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.48480215668678284},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4320589601993561},{"id":"https://openalex.org/C203763787","wikidata":"https://www.wikidata.org/wiki/Q371029","display_name":"Null (SQL)","level":2,"score":0.4171476662158966},{"id":"https://openalex.org/C194222762","wikidata":"https://www.wikidata.org/wiki/Q114486","display_name":"Query by Example","level":4,"score":0.4129437208175659},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.33446672558784485},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.23336514830589294},{"id":"https://openalex.org/C164120249","wikidata":"https://www.wikidata.org/wiki/Q995982","display_name":"Web search query","level":3,"score":0.14403817057609558},{"id":"https://openalex.org/C97854310","wikidata":"https://www.wikidata.org/wiki/Q19541","display_name":"Search engine","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccnt49239.2020.9225575","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt49239.2020.9225575","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6700000166893005,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":45,"referenced_works":["https://openalex.org/W23242426","https://openalex.org/W1505465226","https://openalex.org/W1511560695","https://openalex.org/W1598083179","https://openalex.org/W1648477960","https://openalex.org/W1658853941","https://openalex.org/W1983142587","https://openalex.org/W2001693166","https://openalex.org/W2003115932","https://openalex.org/W2006591097","https://openalex.org/W2008857097","https://openalex.org/W2019622288","https://openalex.org/W2037786632","https://openalex.org/W2081048703","https://openalex.org/W2088475168","https://openalex.org/W2114548346","https://openalex.org/W2115820289","https://openalex.org/W2125321366","https://openalex.org/W2131261404","https://openalex.org/W2138709157","https://openalex.org/W2140506847","https://openalex.org/W2144220405","https://openalex.org/W2144696387","https://openalex.org/W2161688581","https://openalex.org/W2181012807","https://openalex.org/W2231793940","https://openalex.org/W2333725978","https://openalex.org/W2406996495","https://openalex.org/W2483136972","https://openalex.org/W2551915482","https://openalex.org/W2621647126","https://openalex.org/W2747076629","https://openalex.org/W2751199251","https://openalex.org/W2885157722","https://openalex.org/W2940381459","https://openalex.org/W2989803616","https://openalex.org/W4234087511","https://openalex.org/W4238832920","https://openalex.org/W4242751444","https://openalex.org/W4243518384","https://openalex.org/W4285719527","https://openalex.org/W6600897621","https://openalex.org/W6630065895","https://openalex.org/W6753392325","https://openalex.org/W6770447937"],"related_works":["https://openalex.org/W1538798823","https://openalex.org/W2183270057","https://openalex.org/W1481729347","https://openalex.org/W3021027296","https://openalex.org/W2738342198","https://openalex.org/W2743421908","https://openalex.org/W2183825452","https://openalex.org/W2117902529","https://openalex.org/W2483961218","https://openalex.org/W218121808"],"abstract_inverted_index":{"Now-a-days":[0],"web":[1,75,90],"applications":[2,7,36],"are":[3,8,14,37],"everywhere.":[4],"Usually":[5],"these":[6],"developed":[9],"by":[10,73,128],"database":[11],"program":[12],"which":[13],"often":[15],"written":[16],"in":[17,112],"popular":[18],"host":[19],"programming":[20],"languages":[21],"such":[22],"as":[23],"C,":[24],"C++,":[25],"C#,":[26],"Java,":[27],"etc.,":[28],"with":[29,45],"embedded":[30],"Structured":[31],"Query":[32],"Language":[33],"(SQL).":[34],"These":[35],"used":[38],"to":[39,70,101,118,133],"access":[40],"and":[41,104,144,163],"process":[42],"crucial":[43],"data":[44,56],"the":[46,54,65,74,84,89,106,119,125,156,159],"help":[47],"of":[48,60,64,83,155,167],"Database":[49],"Management":[50],"System":[51],"(DBMS).":[52],"Preserving":[53],"sensitive":[55],"from":[57],"any":[58],"kind":[59],"attacks":[61,80],"is":[62,81],"one":[63,82],"prime":[66],"factors":[67],"that":[68],"needs":[69],"be":[71],"maintained":[72],"applications.":[76,91],"The":[77],"SQL":[78,108],"injection":[79],"important":[85],"security":[86,162],"threat":[87],"for":[88],"In":[92],"this":[93],"paper,":[94],"we":[95],"propose":[96],"a":[97,113,130,152],"code-based":[98],"analysis":[99],"approach":[100,123],"automatically":[102],"detect":[103],"prevent":[105],"possible":[107],"Injection":[109],"Attacks":[110],"(SQLIA)":[111],"query":[114],"before":[115],"submitting":[116],"it":[117],"underlying":[120],"database.":[121],"This":[122],"analyses":[124],"user":[126],"input":[127,135,142,148],"assigning":[129],"complex":[131],"number":[132],"each":[134],"element.":[136],"It":[137],"has":[138],"two":[139],"part":[140],"(i)":[141],"clustering":[143],"(ii)":[145],"safe":[146],"(non-malicious)":[147],"identification.":[149],"We":[150],"provide":[151],"details":[153],"discussion":[154],"proposal":[157],"w.r.t":[158],"literature":[160],"on":[161],"execution":[164],"overhead":[165],"point":[166],"view.":[168]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2},{"year":2021,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
