UGC Approved Journal no 63975(19)
New UGC Peer-Reviewed Rules

ISSN: 2349-5162 | ESTD Year : 2014
Volume 13 | Issue 3 | March 2026

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 8 Issue 5
May-2021
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR2105284


Registration ID:
309162

Page Number

c240-c245

Share This Article


Jetir RMS

Title

REVIEW ON DETECTION OF SQLi and XSS ATTACKS

Abstract

Now a days, people are mostly dependent on internet for many things such as online shopping, bank transactions, internet surfing and many more. Also, adoption of web in areas like communications and productivity via the Internet has outpaced user security awareness. Technologies like smart devices and high-speed mobile networks have allowed for an always-connected vector of malware, fraud, virus, spyware and other complications. The rapid digitalization of the world has increased the usage of online services due to which vast amount of information is shared over the internet. The web-based applications that accept critical information from users stock this information in databases. These applications and the databases are susceptible to all kinds of information security threats due to being accessible through the Internet. Regardless of intent or cause, the consequences of a web threat may vandalize both individuals and organizations. The threats include attacks such as Cross Site Scripting (XSS), Denial of Service Attack, SQL Injection attacks, Phishing attacks, Man in the Middle attack, Brute force attacks, water hole attacks and many more. Among these, SQLi and XSS are the two major web application attacks. This paper focuses on the survey of various approaches used to detect SQLi and Cross Site Scripting (XSS)attacks.

Key Words

Malware, virus, spyware, Web application attacks, SQL Injection attacks, Cross Site Scripting (XSS), Denial of Service Attack, Phishing attacks, Man in the Middle attack, Brute force attacks, water hole attacks.

Cite This Article

"REVIEW ON DETECTION OF SQLi and XSS ATTACKS", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.8, Issue 5, page no.c240-c245, May-2021, Available :http://www.jetir.org/papers/JETIR2105284.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"REVIEW ON DETECTION OF SQLi and XSS ATTACKS", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.8, Issue 5, page no. ppc240-c245, May-2021, Available at : http://www.jetir.org/papers/JETIR2105284.pdf

Publication Details

Published Paper ID: JETIR2105284
Registration ID: 309162
Published In: Volume 8 | Issue 5 | Year May-2021
DOI (Digital Object Identifier):
Page No: c240-c245
Country: BENGALURU, Karnataka, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

000818

Print This Page

Current Call For Paper

Jetir RMS