Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2012
Abstract—SQL injection is a type of attack which the attacker adds Structured Query Language code to a web form input box to gain access or make changes to data. SQL injection vulnerability allows an attacker to flow commands directly to a web application's ...
SQL injection is a type of attack which the attacker adds Structured Query Language code to a web form input box to gain access or make changes to data. SQL injection vulnerability allows an attacker to flow commands directly to a web application's underlying database and destroy functionality or confidentiality. Researchers have proposed different tools to detect and prevent this vulnerability. In this paper we present all SQL injection attack types and also current tools which can detect or prevent these attacks. Finally we evaluate these tools.
2015
Abstract—The Internet and web applications are playing very important role in our today‘s modern day life. Several activities of our daily life like browsing, online shopping and booking of travel tickets are becoming easier by the use of web applications. Most of the web applications use the database as a back-end to store critical information such as user credentials, financial and payment information, company statistics etc. An SQL injection attack targets web applications that are database-driven. This is done by including portions of SQL statements in a web form entry field in an attempt to get the website to pass a newly formed rogue SQL command to the database. Multiple client side and server side vulnerabilities like SQL injection and cross site scripting are discovered and exploited by malicious users. The principle of basic SQL injection is to take advantage of insecure code on a system connected to the internet in order to pass commands directly to a database and to then ...
2021
An Web application developers are still busy writing insecure code that only get fixed when they are noticed or become a problem. This has given room to structured Query Language Injection attack (SQLIA) that result to stealing sensitive information or bypassing authentication procedures on Web based data. Notwithstanding billons of dollar expenses on various mitigations process already in place, yet for the last 15 years SQLIA has always been rated the number one on the OWASP top ten web attack mechanisms employed by hackers to steal data from organizations’ database. It is on record that the majority of actual hacks reported by the press of hackers stealing credit card numbers/ private information etc., are in fact successful SQL injection attacks. Again the fact remains that as the countermeasures become more sophisticated, different forms of SQLIA also continues to evolve, thus thwarting the attempt of eliminating it completely. SQLIA have no specific pattern hence the major dif...
The increasing dependence on web applications have made them a natural target for attackers. Among these attacks SQL Injection Attacks (SQLIA) are the most prevalent. In this paper we propose a SQL injection vulnerability scanner that is light-weight, fast and has a low false positive rate. These scanners prove as a practical tool to discover the vulnerabilities in a web application as well as to test the efficiency of counter attack mechanisms. In the latter part of our work we propose a security mechanism to counter SQL Injection Attacks. Our security methodology is based on the design of a filter for the HTTP request send by clients or users and look for attack signatures. The proposed filter is generic in the sense that it can be used with any web application. Finally we test our proposed security mechanism using the vulnerability scanner developed by us as well as other well known scanners. The proposed security mechanism is able to counter all the vulnerabilities that were previously reported before the deployment of our security framework
Ijccer, 2013
Web applications have become an integral part of the daily life. One of the most serious types of attack against web applications is SQL injection. SQL injection is a type of attack which the attacker adds Structured Query Language code to a web form input box to gain access or make changes to data. This paper proposes a simple and efficient framework to detect SQL injection attacks. The method converts the runtime query into sequence of tokens and then compares it with the predetermined queries. In order to reduce runtime validation, the possible queries at the query execution points are separately stored during static analysis. This method uses combined static and dynamic analysis.
2nd International Conference Recent Innovation in Science and Engginerring, 2017
In the world of digitization, web applications are widely used. SQL injection attack are most commonly used by attackers; that’s why it're very dangerous attack. The interaction between the web application and database is done through Structure query language (SQL). The malicious code is injected into string and then passes through the database backend for parsing and execution. Structure query language injection attack is ranked first in the open web application security project (OWASP). impact of SQL injection attack is losses confidentiality, integrity, authentication and authorization.This paper focuses on the consequences, comparison and analysis of SQL injection attack detection techniques to check their effectiveness. The evaluation is based on the resources needed to implement the SQLIA detection techniques and helps other researchers choose the right techniques for further studies. Keywords: SQL injection attack, SQL attack types and categories, detection techniques,.
2013
SQL injection attacks are a serious security threat to Web applications. They allow attackers to gain unrestricted access to the databases underlying the applications and to retrieve sensitive information from databases. Many researchers and practitioners have proposed various methods to solve the SQL injection problem, current ways either fail to solve the full scope of the problem or have limitations that prevent their use. Many researchers and practitioners are familiar with only a subset of the wide range of techniques available to attackers who are trying to take advantage of SQL injection vulnerabilities. Many solutions proposed in the literature solve only some of the issues related to SQL injection. To solve this problem, we give an extensive review of the different types of SQL injection attacks. For each type of attack, we provide descriptions and examples of how attacks of that type could be performed. We also analyze existing detection and prevention techniques against S...
2010 3rd International Conference on Computer Science and Information Technology, 2010
SQL Injection Attacks (SQLIAs) is one of the most serious threats to the security of database driven applications. In fact, it allows an attacker to gain control over the database of an application and consequently, an attacker may be able to alter data. Many surveys have addressed this problem. Also some researchers have proposed different approaches to detect and prevent this vulnerability but they are not successful completely. Moreover, some of these approaches have not implemented yet and users would be confused in choosing an appropriate tool. In this paper we present all SQL injection attack types and also different tools which can detect or prevent these attacks. Finally we assessed addressing all SQL injection attacks type among current tools.
International Journal of Computer Applications, 2014
SQL injections have been always the top most priority for any website and web application. Every web application and website developed in php, asp.net, jsp which is connected to the database like MySQL, Microsoft SQL Server, and oracle are prone to SQL injection attacks. Most of the websites are created by using open source language such as php. The paper focuses the types of SQL injection attacks on the open source database in MySQL .The aim is to create a dummy web site where users can login and register. The attacker can login these dummy website using different types of SQL injection, make changes in the database, detect these types of attacks using IP tracking methods with their injection types and to prevent them.
International journal of engineering research and technology, 2013
The uses of web application has become increasingly popular in our daily life as reading news paper, reading magazines, making online payments for shopping etc. At the same time there is an increase in number of attacks that target them. In particular, SQL injection, a class of code injection attacks in which specially crafted input strings result in illegal queries to a database, has become one of the most serious threats to web applications. This paper proposes a novel specification-based methodology for the prevention of SQL injection Attacks. The two most important advantages of the new approach against existing analogous mechanisms are that, first, it prevents all forms of SQL injection attacks; second, Current technique does not allow the user to access database directly in database server. The innovative technique “Web Service Oriented XPATH Authentication Technique” is to detect and prevent SQL Injection Attacks in database the deployment of this technique is by generating f...
SQL injections have become a serious threat to the integrity, confidentiality and security of web applications. Attackers can gain unauthorized access to the database and can cause serious damage to the web application. Researchers have proposed various solutions to this problem. Many tools have also been devised to deal with this problem but each come with a limitation. In this paper, study about SQL injections has been done. Various types of SQL injection and tools to counter them has been discussed in this paper. For each technique, we have discussed its strengths and weaknesses in addressing the entire range of SQL injection attacks.
— Web applications witnessed a rapid growth for online business and transactions are expected to be secure, efficient and reliable to the users against any form of injection attacks. SQL injection is one of the most common application layer attack techniques used today by hackers to steal data from organizations. It is a technique that exploits a security vulnerability occurring in the database layer of a web application. The attack takes advantage of poor input validation in code and website administration. It allows attackers to obtain illegitimate access to the backend database to change the intended application generated SQL queries.. In spite of the development of different approaches to prevent SQL injection, it still remains a frightening risk to web applications. In this paper, we present a detailed review on various types of SQL injection attacks, detection and prevention techniques, and their comparative analysis based on the performance and practicality.
Today, most of the web applications are associated with database at back-end so there are possibilities of SQL injection attacks (SQLIA) on it. A number of preventive measures have also been discovered by various researchers to overcome this attack, but which measure is more convenient and provides fast access to application without compromising the security is also a major concern nowadays. This paper provides a clear distinction among different types of SQLIAs and how these can be performed on local server. Also, demonstration of SQLIAs on live websites is provided for better understanding of URL attacks. Finally, a complete set of guidelines is provided to help understand the causes of various SQLIAs and how to detect them prior and their preventive measures for the developers of database-driven web applications and researchers.
2022 5th International Conference on Advances in Science and Technology (ICAST), 2022
An SQL Injection attack is a database focused attack for programmes that utilise data. It is accomplished by inserting malicious lines of code into the SQL query to alter and modify its meaning, allowing the attacker to gain access to the database or retrieve sensitive data. Many strategies for detecting and preventing such assaults have been developed and suggested. This study provides an in depth examination of 38 publications on approaches for detecting SQL Injection in web applications. This offers a foundation for designing and using efficient SQL Injection, detection and prevention techniques.
Proceedings of the 2010 2nd International Conference on Computational Intelligence Communication Systems and Networks, 2010
Database driven web application are threaten by SQL Injection Attacks (SQLIAs) because this type of attack can compromise confidentiality and integrity of information in databases. Actually, an attacker intrudes to the web application database and consequently, access to data. For stopping this type of attack different approaches have been proposed by researchers but they are not enough because usually they have limitations. Indeed, some of these approaches have not implemented yet and also most of implemented approaches cannot stop all type of attacks. In this paper all type of SQL injection attack and also different approaches which can detect or prevent them are presented. Finally we evaluate these approaches against all types of SQL injection attacks and deployment requirements.
SQL injection vulnerability is the one of the most common web-based application vulnerabilities that can be exploited by SQL injection attack to gain access to restricted data, bypass authentication mechanism, and execute unauthorized data manipulation language. Defensive coding is a simple and affordable way to tackle this problem, however there are some issue regarding use of defensive coding which makes the system in effective, less resistant and resilience to attack. In this paper we provide detailed background of SQLIA (SQL Injection Attack), classified defensive coding to different categories, reviewed existing technique that are related to each techniques, state strength and weakness of such technique, evaluate such technique based on number of attacks they were able to stop and evaluate each category of approach based on its deployment requirements related to inheritance. The goal of this paper is to provide programmers with common issues that need to be considered before choosing a particular technique and to raise awareness of issues related to such techniques as many of those techniques were not meant for the purpose of protection of SQLIA. In addition, we hope to provide researchers by shedding light on how to develop good SQLI (SQL Injection) protection tools as most of the SQLI protection tools were developed using combination a of two or more defensive coding techniques. Lastly we provide recommendations on to avoid such issues.
Bulletin of National Technical University "KhPI". Series: System Analysis, Control and Information Technologies, 2018
Software security gains importance day by day and developers try to secure web applications as much as possible to protect confidentiality, integrity and availability that are described in the fundamental security model so-called CIA triad. SQL injection vulnerability which can violate the confidentiality and integrity principles of the CIA triad is reviewed, and SQL injection attack execution and protection techniques are explained. The common frameworks’ solutions against SQL injection vulnerability were compared, and this comparison shown the most used techniques in this domain. Error-based and time-based detection algorithms for SQL injection’s identification are developed to create a vulnerability scanner that can detect SQL attacks which cause vulnerability in web applications, and these algorithms are represented in form of UML-activity diagrams. In order to discover all possible links and forms to perform SQL injection vulnerability tests in the entire website, a web crawler...
SQL injection vulnerability is the one of the most common web-based application vulnerabilities that can be exploited by SQL injection attack to gain access to restricted data, bypass authentication mechanism, and execute unauthorized data manipulation language. Defensive coding is a simple and affordable way to tackle this problem, however there are some issue regarding use of defensive coding which makes the system in effective, less resistant and resilience to attack. In this paper we provide detailed background of SQLIA (SQL Injection Attack), classified defensive coding to different categories, reviewed existing technique that are related to each techniques, state strength and weakness of such technique, evaluate such technique based on number of attacks they were able to stop and evaluate each category of approach based on its deployment requirements related to inheritance. The goal of this paper is to provide programmers with common issues that need to be considered before choosing a particular technique and to raise awareness of issues related to such techniques as many of those techniques were not meant for the purpose of protection of SQLIA. In addition, we hope to provide researchers by shedding light on how to develop good SQLI (SQL Injection) protection tools as most of the SQLI protection tools were developed using combination a of two or more defensive coding techniques. Lastly we provide recommendations on to avoid such issues.
bit-Tech
Among the various types of software vulnerabilities, command injection is the most common type of threat in web applications. In command injection, SQL injection type of attacks areextremely prevalent, and ranked as the second most common form of attack on web. SQL injection attacks involve the construction of application’s input data that will result in the execution of malicious SQL statements. Most of the SQL injection detection techniques involve the code to be written along with the actual scripting code. These techniques do not detect errors in SQL statements. Hence, this paper proposes a mechanism to identify invalid SQL statements, to analyze the query for invalid non SQL key words, and to customize the captured errors. This mechanism is different from others by means of separation of the main scripting code and SQL injection code.
International Journal of Advancements in Computing Technology, 2011
SQL injection is a type of attack which the attacker adds Structured Query Language code to a web form input box to gain access or make changes to data. SQL injection vulnerability allows an attacker to flow commands directly to a web application's underlying database and destroy functionality or confidentiality. Researchers have proposed different tools to detect and prevent this vulnerability. In this paper we present SQL injection attack types and also current techniques which can detect or prevent these attacks. Finally we evaluate these techniques.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.