Sabilillah Fauzal Addim, . (2023) IMPLEMENTASI AES 256 UNTUK PENCEGAHAN SQL INJECTION DI PARAMETER ALAMAT URL DI TAHAP PREPARE STATEMENT. Skripsi thesis, Universitas Pembangunan Nasional Veteran Jakarta.
Text
ABSTRAK.pdf Download (14kB) |
|
Text
AWAL.pdf Download (457kB) |
|
Text
BAB I.pdf Restricted to Repository UPNVJ Only Download (94kB) |
|
Text
BAB II.pdf Restricted to Repository UPNVJ Only Download (1MB) |
|
Text
BAB III.pdf Restricted to Repository UPNVJ Only Download (267kB) |
|
Text
BAB IV.pdf Restricted to Repository UPNVJ Only Download (2MB) |
|
Text
BAB V.pdf Download (82kB) |
|
Text
DAFTAR PUSTAKA.pdf Download (152kB) |
|
Text
RIWAYAT HIDUP.pdf Restricted to Repository UPNVJ Only Download (115kB) |
|
Text
LAMPIRAN.pdf Restricted to Repository UPNVJ Only Download (3MB) |
|
Text
HASIL PLAGIARISME.pdf Restricted to Repository staff only Download (210kB) |
|
Text
ARTIKEL KI.pdf Restricted to Repository staff only Download (231kB) |
Abstract
With the rapid advancement of web technology, some individual activities are carried out there. So that web applications become important as a support for individual activities on the internet in their daily lives. The danger of data leakage on websites due to SQL injection is often encountered cases and even according to the OWASP organization which is a community that discusses web applications determines that the threat of SQL injection is in 3rd place out of the top 10. The way this threat works is because the results of user input to the application are displayed in a clear and invalidated manner, this can potentially be used as an injection area for malicious SQL statements that function to extract data from the database. Therefore, the threat of SQL injection attacks has a great impact because the attacker can gain access rights to the website database and information on the website like a legitimate user. This paper presents an approach to identify and secure the values or contents in the parameters placed in the URL address highlighting 2 aspects: the first is to make the parameter values or contents confidential by encryption and the second step is to prepare SQL statements to keep the SQL query from becoming a malicious query and ensure that the parameter values bound in the query have appropriate data types and are modified in a safe form so that they are eligible for execution.
Item Type: | Thesis (Skripsi) |
---|---|
Additional Information: | [No.Panggil: 1810511017] [Pembimbing: Henki Bayu Seta] [Penguji 1: Didit Widiyanto] [Penguji 2: Yuni Widiastiwi] |
Uncontrolled Keywords: | SQL Injection Attack, Security URL address parameters, AES-256, Prepare Statement |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science Q Science > QA Mathematics > QA76 Computer software |
Divisions: | Fakultas Ilmu Komputer > Program Studi Informatika (S1) |
Depositing User: | Sabilillah Fauzal Addim |
Date Deposited: | 16 Feb 2024 08:43 |
Last Modified: | 16 Feb 2024 08:43 |
URI: | http://repository.upnvj.ac.id/id/eprint/27817 |
Actions (login required)
View Item |