Method and Algorithm for Determining Weaknesses in a Distributed Database
Keywords:
SQL injection, classic and blind SQL-injection, offline injectionAbstract
The article analyzes the SQL injection attack and its types in the distributed database, the vulnerability search algorithm, the vulnerability detection algorithm by query analysis in the MySQL (SQL) database, linear search algorithm, binary search algorithm, interpolation search algorithms have been developed
Downloads
Published
2023-08-20
How to Cite
Sadikov Sh.M. (2023). Method and Algorithm for Determining Weaknesses in a Distributed Database. Global Scientific Review, 18, 22–29. Retrieved from http://scienticreview.com/index.php/gsr/article/view/262
Issue
Section
Articles
License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.