Intercepting Filter Approach to Injection Flaws

Ahmed Salem
Volume: 6, No: 4, Page: 563 ~ 574, Year: 2010
10.3745/JIPS.2010.6.4.563
Keywords: Injection Flaws, SQL Injection, Intercepting Filter, Cross-site Scripting Vulnerability
Full Text:

Abstract
The growing number of web applications in the global economy has made it critically important to develop secure and reliable software to support the economy's increasing dependence on web-based systems. We propose an intercepting filter approach to mitigate the risk of injection flaw exploitation- one of the most dangerous methods of attacking web applications. The proposed approach can be implemented in Java or .NET environments following the intercepting filter design pattern. This paper provides examples to illustrate the proposed approach.

Article Statistics
Multiple requests among the same broswer session are counted as one view (or download).
If you mouse over a chart, a box will show the data point's value.


Cite this article
IEEE Style
Ahmed Salem , "Intercepting Filter Approach to Injection Flaws ," Journal of Information Processing Systems, vol. 6, no. 4, pp. 563~574, 2010. DOI: 10.3745/JIPS.2010.6.4.563 .

ACM Style
Ahmed Salem , "Intercepting Filter Approach to Injection Flaws ," Journal of Information Processing Systems, 6, 4, (2010), 563~574. DOI: 10.3745/JIPS.2010.6.4.563 .