Detection & prevention of cyber attack using SPWEPTLU policy
This technique helps to secure your application from external attacks by optimizing database feature. This technique is defined by me and is completely hidden from the researchers sight.
Basically the solution helps the organizations to protect themselves from cyber attacks. Since I have hacked many organizations in my country. I found the root of the problem what causes hacking and how can we prevent it. So I traveled to many countries and I found the same security threats in many applications as developers develop technologies without much considering security. They provide basic security like login feature, hashing password, basic authentication and authorization. Therefore aftet alot of studies I have come across several solutions. So by combining solutions and using my creativity I developed a new technique for securing applications such as mobile and website etc. Thereafter I have written my first research paper in cyber security published in IJSER journel.
This solution solves any cyber attacks that the end user performing. When I hacked my university database I deleted the student table only becuase I wanted to examine my knowledge not to harm organization then it really affected more than 1000 students whose records was deleted and there were unable to access their online portal. This solution not only locally contributes but also it helps globally. As cyber attacks are the most dangerous attacks in the world so it can affect any community starting from small scale to enterprise scale business. so in simple words this technique parse the data being to the databass analysis any security measures and remove it and then execute the statement and send it back to the client.
The danger described above is affected many countries so far Afghanistan, turkey, Dubai and central Asia, US, UK and so on. It has a large domain as every developers know that cyber attacks are most dangerous attacks and it can happen every second in the world. So as far as I hacked organizations in my country, in turkey, in dubai abd after that I provided them the solution. Now they happily and safely keep their credientials online and full trust on their security.
Exactly, I applied my solution in my university initially and I taught all the members of IT department the solution meanwhile I was checking everything to see that there is no fault. Morever we also perform testing to see if any result fails and what counter messure we should take. And yes my research paper is available online Detection & prevention of SQL injection & Cross site scripting attacks using SPWEPTLU technique
- Other: Addressing an unmet social, environmental, or economic need not covered in the four dimensions above
My solution address economic, healthcare, learning opportunity becuase safe software or database system means safe organization and increasing profitibility. As learners need to learn this technique. Healthcare can trust to store patients sensitive data and businessman can look accurate information and believe that their data is safe and it is not hacked.
- Growth: An organization with an established product, service, or business model rolled out in at least one community, which is poised for further growth
Kardan University. We have already implemented the solution and we were group of 5 people and as a head I was there to lead the team.
- A new use of an existing technology (e.g. application to a new problem or in a new location)
technology used in this technique is SQL Server procedure and logins, C#,ASP.net webforms, Jquery ajax. Simply we optimized the procedures with allowance only to the login we created therefore every user has specific set of rules that they can access. Meanwhile they are not able to access or delete or update anything other than what procedural database rules with login defines.
- Software and Mobile Applications
- Afghanistan
we have already implemented in many organizations inside the country which is more than thousand people and we try to implment it in other countries as well. This solution is also implmented in dubai with a company named Aumran Amir that I currently work with remotely.
for next year my plan is to attend the US conference IEEE and maximize my solution in US and UK as well.
fortunately our plan is successful till now and implmented in so many organizations
Due to war in our country right now we are unable to accomplish my goal of implementing security features in other countries as there is no embassies in our country working thus this makes our plan for next year a bit chanllenging
they are ready now to deliver the solution as they are well trained and they already got experience in implementing the solution in university.
currently the work with Aumran amir is near to finish and everything is up to the goal we defined.
- Yes
Simply as the solution itself is so valuable that saves the cyber attacks we consider ourself for that price
- Yes
Simply as the solution itself is so valuable that saves the cyber attacks we consider ourself for that price

Preventing cyber attacks using my defined technique