An Efficient Technique for Detection and Prevention of SQL Injection Attack using ASCII Based String Matching

被引:13
|
作者
Balasundaram, Indrani [1 ]
Ramaraj, E. [1 ]
机构
[1] Madurai Kamaraj Univ, Dept Comp Sci, Madurai 625021, Tamil Nadu, India
关键词
SQL Injection Attack; Web applications; Web security; Data validation;
D O I
10.1016/j.proeng.2012.01.850
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rise of the Internet, web applications, such as online banking and web-based email, have become integral to many people's daily lives. Web applications have brought with them new classes of computer security vulnerabilities, such as SQL injection. It is a class of input validation based vulnerabilities. Typical uses of SQL injection leak confidential information from a database, by-pass authentication logic, or add unauthorized accounts to a database. This security prevents the unauthorized access to your database and also it prevents your data from being altered or deleted by users without the appropriate permissions. Malicious Text Detector, Constraint Validation, Query length validation and Text based Key Generator are the four types of filtration technique used to detect and prevent the SQL Injection Attacks from accessing the database (C) 2011 Published by Elsevier Ltd. Selection and/or peer-review under responsibility of ICCTSD 2011
引用
收藏
页码:183 / 190
页数:8
相关论文
共 50 条
  • [1] SQL Injection Attack Detection Using Fingerprints and Pattern Matching Technique
    Appiah, Benjamin
    Opoku-Mensah, Eugene
    Qin, Zhiguang
    [J]. PROCEEDINGS OF 2017 8TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2017), 2017, : 583 - 587
  • [2] AN EFFICIENT TECHNIQUE FOR PREVENTING SQL INJECTION ATTACK USING PATTERN MATCHING ALGORITHM
    Prabakar, M. Amutha
    KarthiKeyan, M.
    Marimuthu, K.
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN COMPUTING, COMMUNICATION AND NANOTECHNOLOGY (ICE-CCN'13), 2013, : 503 - 506
  • [3] SQL injection attack: Detection, prioritization & prevention
    Paul, Alan
    Sharma, Vishal
    Olukoya, Oluwafemi
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 85
  • [4] An Efficient Approach Toward Security of Web Application Using SQL Attack Detection and Prevention Technique
    Bharati, Vishal
    Kumar, Arun
    [J]. INVENTIVE COMPUTATION AND INFORMATION TECHNOLOGIES, ICICIT 2021, 2022, 336 : 781 - 792
  • [5] SQL Injection Attack Detection using ResNet
    Sangeeta
    Nagasundari, S.
    Honnavali, Prasad B.
    [J]. 2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2019,
  • [6] Analysis and implementation of SQL injection attack and countermeasures using SQL injection prevention techniques
    Jesudoss, A.
    Mercy, Theresa M.
    Christy, A.
    Maheswari, M.
    Selvi, M.
    Ulagamuthalvi, V
    [J]. INTERNATIONAL JOURNAL OF ENGINEERING SYSTEMS MODELLING AND SIMULATION, 2022, 13 (04) : 262 - 267
  • [7] Efficient Detection Of SQL Injection Attack(SQLIA) Using Pattern-based Neural Network Model
    Begum, Meharaj A.
    Arock, Michael
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, AND INTELLIGENT SYSTEMS (ICCCIS), 2021, : 343 - 347
  • [8] Prevention of SQL Injection Attack Using Query Transformation and Hashing
    Kar, Debabrata
    Panigrahi, Suvasini
    [J]. PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2013, : 1317 - 1323
  • [9] SQL Injection Attacks Detection and Prevention Based on Neuro-Fuzzy Technique
    Nofal, Doaa E.
    Amer, Abeer A.
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCED INTELLIGENT SYSTEMS AND INFORMATICS 2019, 2020, 1058 : 722 - 738
  • [10] SQL Injection Attack Prevention Based on Decision Tree Classification
    Hanmanthu, B.
    Ram, B. Raghu
    Niranjan, P.
    [J]. PROCEEDINGS OF 2015 IEEE 9TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO), 2015,