DATABASE APPLICATION PROTECTION USING MD5 ALGORITHM
P.Mullai, Mahesh.KP, S.Subasree
International Research Journal in Global Engineering and Sciences (IRJGES), 2017, Vol.3. Issue 1. pp. 30-36
In the present generation, people are more connected to the digital life. Thereby, the importance of securing the digital data has become more vital. The field of Security, the application of Internet, the Communication and Computer Network technologies have developed rapidly. Especially the emergence of Internet has increased the usage of Computer for different applications in government, business, health Care and other areas of society resulting in a greater impact on people's economy, work and life. There are different types of hackers like the script kiddie, white hat, black hat, gray hat, green hat, red hat and blue hat, where these hackers can hack all the information and make the security under serious threat. Likewise, the database hackers can hack the database information by various attacks like the code modification attacks, SQL injections and data centric attacks. Thereby, an efficient technique implementing the MD5 algorithm is used to provide more protection to detect the anomaly and to maintain the integrity of the data in the database applications.
Keywords: Anomaly, Code modification attacks, Database, Data centric attacks, Security and SQL injections.
P.Mullai, Mahesh.KP, S.Subasree, "Database Application Protection Using MD5 Algorithm ", International Research Journal in Global Engineering and Sciences (IRJGES), 2018, Vol.3. Issue 1. pp. 30-36.