A taxonomy of SQL Injection Attacks

被引:16
|
作者
Sadeghian, Amirmohammad [1 ]
Zamani, Mazdak [1 ]
Abdullah, Shahidan M. [1 ]
机构
[1] Univ Teknol Malaysia, Adv Informat Sch, Kuala Lumpur, Malaysia
关键词
SQL Injection; SQLIA; Web Application Vulnerability; Information Security;
D O I
10.1109/ICICM.2013.53
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays web applications play an important role in online business including social networks, online services, banking, shopping, classes, email and etc. Ease of use and access to web application make them more popular in offering online services instead of in person services. a simple user just need a computer and an internet connection to access web application and use online services provided by that application. There is one core in common between all dynamic web application and that is their need to use a database to store information inside that and retrieve that information upon the user request or add, edit and delete them. Among all database types, rational databases are very popular. Most of relational database management systems such as MySQL, Oracle, MS SQL Server, MS Access, Postgres use SQL as their language. Flexibility of SQL makes it a powerful language. It allows the user to ask what information he wants without having any knowledge about how the information will be fetch. However vast use of SQL based databases make it the center of attention of hackers. SQL injection attack is a well-known security threat to database driven web applications. A successful SQL injection attack reveals critical confidential information to the hacker. In this paper first we provided background information on this vulnerability. Next we present a comprehensive review of different types of SQL injection attack. For each attack we provide an example that shows how the attack launches. Finally we propose the best solution at development phase to defeat SQL injection and conclusion.
引用
收藏
页码:269 / 273
页数:5
相关论文
共 50 条
  • [1] On Preventing SQL Injection Attacks
    Ahuja, Bharat Kumar
    Jana, Angshuman
    Swarnkar, Ankit
    Halder, Raju
    [J]. ADVANCED COMPUTING AND SYSTEMS FOR SECURITY, VOL 1, 2016, 395 : 49 - 64
  • [2] Inferential SQL injection attacks
    Štampar, Miroslav
    [J]. International Journal of Network Security, 2016, 18 (02) : 316 - 325
  • [3] SQL-Identifier Injection Attacks
    Cetin, Cagri
    Goldgof, Dmitry
    Ligatti, Jay
    [J]. 2019 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2019, : 151 - 159
  • [4] SQL injection attacks - a systematic review
    Sharma, Kirti
    Bhatt, Shobha
    [J]. International Journal of Information and Computer Security, 2019, 11 (4-5): : 493 - 509
  • [5] USING SNORT IN SQL INJECTION ATTACKS
    AlNabulsi, Hussein
    Alsmadi, Izzat
    AlJarrah, Mohammad
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2020, 14 (02): : 37 - 46
  • [6] SQL injection attacks with the AMPA suite
    Cecchini, Simone
    Gan, Diane
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2013, 5 (02) : 139 - 160
  • [7] Detection and prevention of SQL injection attacks
    Halfond, William G. J.
    Orso, Alessandro
    [J]. MALWARE DETECTION, 2007, : 85 - +
  • [8] SQLrand: Preventing SQL injection attacks
    Boyd, SW
    Keromytis, AD
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2004, 3089 : 292 - 302
  • [9] Diversifying SQL to prevent injection attacks
    Rauti, Sampsa
    Teuhola, Jukka
    Leppanen, Ville
    [J]. 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 344 - 351
  • [10] A Taxonomy of SQL Injection Detection and Prevention Techniques
    Sadeghian, Amirmohammad
    Zamani, Mazdak
    Abd Manaf, Azizah
    [J]. 2013 INTERNATIONAL CONFERENCE ON INFORMATICS AND CREATIVE MULTIMEDIA (ICICM), 2013, : 53 - 56