Investigation framework of web applications vulnerabilities, attacks and protection techniques in structured query language injection attacks

被引:0
|
作者
Ali N.S. [1 ]
机构
[1] Information Technology Research and Development Centre, University of Kufa, AL-Najaf, Al-Kufa St
来源
International Journal of Wireless and Mobile Computing | 2018年 / 14卷 / 02期
关键词
Defensive approaches; Detection; Investigation framework; Protection; Protection techniques; Security attacks; SQL injection; SQLI prevention; SQLIA; Techniques; Web applications; Web attacks; Web security; Web vulnerabilities; XSS;
D O I
10.1504/IJWMC.2018.091137
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Web security has become a great challenge in recent years. Structured Query Language Injection Attack (SQLIA) is a prevalent and dominant class of the serious web application attacks. A crafter can easily get illegal access to the underlying database in the web application thereby gaining full control of the system and causing millions of dollars loss for corporations. In this paper, we provide a comprehensive study of web applications and investigate their vulnerabilities, attacks, and protection techniques against SQLIA Attacks. The study includes presenting a taxonomy of the SQLIAs investigation framework, conducts a detailed review of the various previous SQLI attacks protection techniques, as well as a summary and analysis of a critical review (strengths and weaknesses) of the detection and prevention techniques that have been done to address such attacks. Finally, it highlights and focuses on the critical and important directions or protection approaches that require more studies by future researchers. © 2018 Inderscience Enterprises Ltd.
引用
收藏
页码:103 / 122
页数:19
相关论文
共 39 条
  • [21] WebAppArmor: A Framework for Robust Prevention of Attacks on Web Applications (Invited Paper)
    Venkatakrishnan, V. N.
    Bisht, Prithvi
    Ter Louw, Mike
    Zhou, Michelle
    Gondi, Kalpana
    Ganesh, Karthik Thotta
    INFORMATION SYSTEMS SECURITY, 2010, 6503 : 3 - 26
  • [22] Automated Discovery of Java']JavaScript Code Injection Attacks in PHP Web Applications
    Gupta, Shashank
    Gupta, B. B.
    1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 82 - 87
  • [23] Secured Web Application Using Combination of Query Tokenization and Adaptive Method in Preventing SQL Injection Attacks
    Abu Othman, Noor Ashitah
    Ali, Fakariah Hani Mohd
    Noh, Mashyum Binti Mohd
    2014 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS, AND CONTROL TECHNOLOGY (I4CT), 2014, : 472 - 476
  • [24] Security Standards Perspective to Fortify Web Database Applications From Code Injection Attacks
    Madan, Sushila
    Madan, Supriya
    UKSIM-AMSS FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS, MODELLING AND SIMULATION, 2010, : 226 - +
  • [25] Detecting command injection attacks in web applications based on novel deep learning methods
    Wang, Xinyu
    Zhai, Jiqiang
    Yang, Hailu
    SCIENTIFIC REPORTS, 2024, 14 (01):
  • [26] SMask: Preventing Injection Attacks in Web Applications by Approximating Automatic Data/Code Separation
    Johns, Martin
    Beyerlein, Christian
    APPLIED COMPUTING 2007, VOL 1 AND 2, 2007, : 284 - 291
  • [27] A Web Application Runtime Application Self-protection Scheme against Script Injection Attacks
    Yin, Zhongxu
    Li, Zhufeng
    Cao, Yan
    CLOUD COMPUTING AND SECURITY, PT II, 2018, 11064 : 566 - 577
  • [28] Mitigation from SQL Injection Attacks on Web Server using Open Web Application Security Project Framework
    Fadlil, A.
    Riadi, I.
    Mu'min, M. A.
    INTERNATIONAL JOURNAL OF ENGINEERING, 2024, 37 (04): : 635 - 645
  • [29] A Formal Approach to Exploiting Multi-stage Attacks Based on File-System Vulnerabilities of Web Applications
    De Meo, Federico
    Vigano, Luca
    ENGINEERING SECURE SOFTWARE AND SYSTEMS, ESSOS 2017, 2017, 10379 : 196 - 212
  • [30] A Survey on Detection Techniques to Prevent Cross-Site Scripting Attacks on Current Web Applications
    Garcia-Alfaro, Joaquin
    Navarro-Arribas, Guillermo
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY, 2008, 5141 : 287 - +