Research Article
Neutralizing SQL Injection Attack Using Server Side Code Modification in Web Applications
Table 2
Comparison of the proposed method with existing approaches.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Y: successfully detect/prevent the attack types. N: not able to detect/prevent the attack types. P: partially handles the attack type. |