首页--工业技术论文--自动化技术、计算机技术论文--计算技术、计算机技术论文--计算机软件论文--程序设计、软件工程论文--程序设计论文

Query Tokenization Approach to the Detection and Prevention of SQL Injection Attacks

Abstract第6页
摘要第7-11页
Dedication第11-12页
Acknowledgements第12-15页
List of abbreviations第15-16页
List of Tables第16-17页
List of Figures第17-18页
Chapter 1 Introduc tion第18-29页
    1.1 Motivation第18-19页
    1.2 Research Objectives第19-20页
        1.2.1 Problem Description第19页
        1.2.2 Research goals第19-20页
    1.3 Introduction to SQL Injection Attacks第20-28页
        1.3.1 SQL Injection Overview第20-26页
        1.3.2 Understanding database vulnerability to SQL Injection Attack第26-28页
    1.4 Contribution of this Thesis第28页
    1.5 Organization of the Thesis第28-29页
Chapter 2 Theory basis and contribution of previous researches to our research第29-40页
    2.1 Introduction第29页
    2.2 SQL Injection Attacks Detection and Prevention Overview第29-30页
    2.3 Previous researches contribution to the detection and prevenion of SQL Injection Attacks第30-38页
        2.3.1 Solutions based on best practice coding第30-35页
        2.3.2 Solutions based on learning from the first query executed第35-36页
        2.3.3 Partial solutions第36-38页
    2.4 Previous researches assistance to my research第38-39页
    2.5 Summary第39-40页
Chapter 3 Query Tokenization approach to the detection and prevention of SQLInjection Attacks第40-54页
    3.1 Introduction第40页
    3.2 SQL Query Overview第40-43页
    3.3 Tokenization第43-44页
    3.4 Query Tokenization and Injection Detection Algrithms第44-53页
        3.4.1 Query Tokenization Algorithm第44-49页
        3.4.2 Injection detection process第49-53页
    3.5 Summary第53-54页
Chapter 4 Implementation of query tokenization to detect and prevent SQL InjectionAttacks第54-80页
    4.1 Introduction第54页
    4.2 SRS Descirption第54-56页
    4.3 SRS Architecture, design patterns and modeling language第56-63页
        4.3.1 SRS Architecture第56-57页
        4.3.2 Design Pattern第57-60页
        4.3.3 Unified Modeling Language (UML)第60-63页
    4.4 SRS database第63-65页
        4.4.1 SRS Entity Relationship Diagram第64-65页
    4.5 Our approach implementation using java第65-71页
        4.5.1 Query Tokenizer第66-67页
        4.5.2 QueryEntry第67-68页
        4.5.3 TokensHashTable第68-69页
        4.5.4 TableBuilder第69-70页
        4.5.5 InjectionDetector第70-71页
    4.6 SQL Injection detection and prevention Integrated in SRS第71-76页
        4.6.1 Screenshots第73-76页
    4.7 Research Result第76-78页
    4.8 Summary第78-80页
Chapter 5 Conclusion and Future Work第80-83页
    5.1 Conclusion第80-81页
    5.2 Future works第81-83页
References第83-87页
Publications第87页

论文共87页,点击 下载论文
上一篇:论建立我国公共事业预算
下一篇:论组织、领导传销活动罪