Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

You searched for subject:(analyzing IP address). One record found.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters

1. Alward, Redwan A. Early SQL Injection Detection.

Degree: Information Assurance: M.S., Information Assurance and Information Systems, 2016, St. Cloud State University

Computer security is a moving target that moves or increases with the growth of technology. Organizations during the 21st century have to create and/or adopt new technologies in order to stay in business and be competitive. These new technologies involve thousands of lines of code using programming languages, crossing servers, and database engines. Along with the growth of technology, organizations’ IT professionals are trying to prevent any data breach to valuable data from hackers by locking all vulnerable doors that hackers might use to access a system. While IT professionals are trying to lock all vulnerable doors, hackers need only one door to hack a given system using one of the hacking methods available. One of the most used hacking methods and most security concerning is SQL Injection that hackers use to bypass a system by gaining unauthorized access to retrieve or modify valuable data such as Social Security Numbers, bank information, health records, etc. SQL Injection can be achieved through injecting SQL commands into a SQL statement via a web page. There is a number of SQL Injection methods used to gain unauthorized access into a given system; however, SQL Injection through Sign-in/Log-in process is the most used technique with 63% of all SQL injection types used [1]. Therefore, this research focuses on SQL Injection through Sign-in/Log-in process and presents a new way of alerting the system admin of any SQL Injection attempts and blocks, as well as any further access attempts by the same user (abuser). Advisors/Committee Members: Jim Q. Chen, Dennis Guster, Balasubramanian Kasi.

Subjects/Keywords: early alert; IP address; user level by device fingerprinting; three-way handshake; hackers; analyzing IP address

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alward, R. A. (2016). Early SQL Injection Detection. (Masters Thesis). St. Cloud State University. Retrieved from https://repository.stcloudstate.edu/msia_etds/14

Chicago Manual of Style (16th Edition):

Alward, Redwan A. “Early SQL Injection Detection.” 2016. Masters Thesis, St. Cloud State University. Accessed October 22, 2019. https://repository.stcloudstate.edu/msia_etds/14.

MLA Handbook (7th Edition):

Alward, Redwan A. “Early SQL Injection Detection.” 2016. Web. 22 Oct 2019.

Vancouver:

Alward RA. Early SQL Injection Detection. [Internet] [Masters thesis]. St. Cloud State University; 2016. [cited 2019 Oct 22]. Available from: https://repository.stcloudstate.edu/msia_etds/14.

Council of Science Editors:

Alward RA. Early SQL Injection Detection. [Masters Thesis]. St. Cloud State University; 2016. Available from: https://repository.stcloudstate.edu/msia_etds/14

.