High Impact Factor : 4.396 icon | Submit Manuscript Online icon | UGC Approved icon

Understanding SQL Injection Attack Techniques and Implementation of Various Methods for Attack Detection and Prevention

Author(s):

Shruti Gangan , V.E.S INSTITUTE OF TECHNOLOGY, CHEMBUR; Tina Gyanchandani, V.E.S INSTITUTE OF TECHNOLOGY, CHEMBUR; Dhanamma Jagli, V.E.S INSTITUTE OF TECHNOLOGY, CHEMBUR

Keywords:

SQL Injection, Website Security, SQL Injection Detection, SQL Injection Prevention, Sanitization

Abstract

Security issues of different database driven web applications are continue to be an important and crucial aspect of the ongoing development of the Internet. In the last several decades, Web applications have brought new classes of computer security vulnerabilities, such as AQL injection. SQL Injection Attacks (SQLIAs) is one of the most severe threats to the security of database driven web applications as it compromises integrity and confidentiality of information in database. In this type of attack, an attacker gain control over the database of an application and consequently, he/she may be able to alter data. In this paper we present different types of SQL injection attacks and also implementation of different types of tools which can be used to detect and prevent these attacks.

Other Details

Paper ID: IJSRDV3I40489
Published in: Volume : 3, Issue : 4
Publication Date: 01/07/2015
Page(s): 1126-1130

Article Preview

Download Article