Font Size: a A A

Research On Injection Attacks And Defense Of Oracle Database

Posted on:2013-02-09Degree:MasterType:Thesis
Country:ChinaCandidate:H Z ZhangFull Text:PDF
GTID:2218330362967518Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
Along with the development of computer network technology, theInternet has walking into every single home, and a profound impact onall aspects of people's lives, and as a representative product of Internet,the WEB application also develop very fast, from the initial informationacquisition and display to a deeper and broader field. WEB applicationhas many advantages, for example with high flexibility, deploymentprocess is simple and with less changes, easy to operate, easy to unifiedmanagement, etc. Now there are considerable number of enterprisesadopt WEB applications to manage the business flow of the company. Atthe same time in an endless stream of e-commerce sites appear, onlinebanking, shopping sites, etc. All of them have shown that the efficiencyand convenience of the WEB application to our common lives. But withthe convenience that internet age brought us is also result in a lot ofsecurity issues, the frequent occurrence of well-known website attackedby hackers, disclosure of customer information, e-bank account theft, etc.All these events lead to great losses of enterprises and individuals.In this paper, through analysis and study of common SQL injectionvulnerabilities and attack methods of WEB application, in the light ofthese vulnerabilities prevention solutions and examples are given. Oracle database as a widely used large-scale Relational Database ManagementSystem, security issues are also very prominent. In this paper, mainlyimplement the methods to explore the Oracle database SQL injectionpoint, and PL/SQL injections and injection to application.
Keywords/Search Tags:SQL, PLSQL, Injection, Oracle Database, Database security
PDF Full Text Request
Related items