THE IMPACT OF SQL INJECTION ATTACKS ON THE SECURITY OF DATABASES

被引:0
|
作者
Thiyab, Rua Mohamed [1 ]
Ali, Musab A. M. [1 ,2 ]
Basil, Farooq [3 ]
Abdulqader [3 ]
机构
[1] Management & Sci Univ, Shah Alam, Malaysia
[2] Nawroz Univ Kurdistan Reg, Ctr Sci Res & Dev, Dahuk, Iraq
[3] Univ Kebangsaan Malaysia, Bangi, Malaysia
关键词
SQL Injection Attack (SQLIA); SQL Queries; Vulnerability; Dynamic Applications; Input Validation;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
SQL injection Attack (SQLIA) can be detected in many web applications that lack of input variable filtering. The problem of this study is the weak input filtration and validation of forms in dynamic web applications and using a single detection and prevention technique against SQL injection attacks. The aim of this study is to investigate the effect of poor input validation of SQL query to discriminate the parameters used for injection malicious SQL on the security of server database and to improve the filtration level of a user input from real one and a malicious one on dynamic web applications in e-commerce, and to proposes a technique called CombinedDetect based on two methods based on JavaScript and PHP coding to detect malicious SQL query and isolate it before sending to the server. The result of this study shows that many web developers neglect the high risks of SQL injection attacks on the security and confidentially of data stored in databases. The injection of malicious SQL parameters pass to the database in the server could damage the whole database or steal data. The method used in this study is based on JavaScript and PHP codes enable the dynamic web application to separate between normal data and malicious data, nevertheless of what user input is entered through input fields. The study recommended avoiding any weakness in SQL server by providing effective input validation to discriminate the malicious parameters used for injection SQL attack queries and using multiple detection methods for SQL injection.
引用
收藏
页码:323 / 331
页数:9
相关论文
共 50 条
  • [1] Impact of SQL Injection in Database Security
    Gupta, Himanshu
    Mondal, Subhash
    Ray, Srayan
    Giri, Biswajit
    Majumdar, Rana
    Mishra, Ved P.
    PROCEEDINGS OF 2019 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND KNOWLEDGE ECONOMY (ICCIKE' 2019), 2019, : 296 - 299
  • [2] SECSIX: security engine for CSRF, SQL injection and XSS attacks
    Nagpal B.
    Chauhan N.
    Singh N.
    International Journal of System Assurance Engineering and Management, 2017, 8 (Suppl 2) : 631 - 644
  • [3] On Preventing SQL Injection Attacks
    Ahuja, Bharat Kumar
    Jana, Angshuman
    Swarnkar, Ankit
    Halder, Raju
    ADVANCED COMPUTING AND SYSTEMS FOR SECURITY, VOL 1, 2016, 395 : 49 - 64
  • [4] A taxonomy of SQL Injection Attacks
    Sadeghian, Amirmohammad
    Zamani, Mazdak
    Abdullah, Shahidan M.
    2013 INTERNATIONAL CONFERENCE ON INFORMATICS AND CREATIVE MULTIMEDIA (ICICM), 2013, : 269 - 273
  • [5] Inferential SQL injection attacks
    Štampar, Miroslav
    International Journal of Network Security, 2016, 18 (02) : 316 - 325
  • [6] Review of SQL injection attacks: Detection, to enhance the security of the website from client-side attacks
    AL-Maliki, Manar Hasan Ali
    Jasim, Mahdi Nsaif
    INTERNATIONAL JOURNAL OF NONLINEAR ANALYSIS AND APPLICATIONS, 2022, 13 (01): : 3773 - 3782
  • [7] SQL injection attacks - a systematic review
    Sharma K.
    Bhatt S.
    International Journal of Information and Computer Security, 2019, 11 (4-5): : 493 - 509
  • [8] SQL-Identifier Injection Attacks
    Cetin, Cagri
    Goldgof, Dmitry
    Ligatti, Jay
    2019 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2019, : 151 - 159
  • [9] USING SNORT IN SQL INJECTION ATTACKS
    AlNabulsi, Hussein
    Alsmadi, Izzat
    AlJarrah, Mohammad
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2020, 14 (02): : 37 - 46
  • [10] SQL injection attacks with the AMPA suite
    Cecchini, Simone
    Gan, Diane
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2013, 5 (02) : 139 - 160