Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
The increasing dependence on web applications have made them a natural target for attackers. Among these attacks SQL Injection Attacks (SQLIA) are the most prevalent. In this paper we propose a SQL injection vulnerability scanner that is light-weight, fast and has a low false positive rate. These scanners prove as a practical tool to discover the vulnerabilities in a web application as well as to test the efficiency of counter attack mechanisms. In the latter part of our work we propose a security mechanism to counter SQL Injection Attacks. Our security methodology is based on the design of a filter for the HTTP request send by clients or users and look for attack signatures. The proposed filter is generic in the sense that it can be used with any web application. Finally we test our proposed security mechanism using the vulnerability scanner developed by us as well as other well known scanners. The proposed security mechanism is able to counter all the vulnerabilities that were previously reported before the deployment of our security framework
Ijccer, 2013
Web applications have become an integral part of the daily life. One of the most serious types of attack against web applications is SQL injection. SQL injection is a type of attack which the attacker adds Structured Query Language code to a web form input box to gain access or make changes to data. This paper proposes a simple and efficient framework to detect SQL injection attacks. The method converts the runtime query into sequence of tokens and then compares it with the predetermined queries. In order to reduce runtime validation, the possible queries at the query execution points are separately stored during static analysis. This method uses combined static and dynamic analysis.
SQL injection is a type of attack which the attacker adds Structured Query Language code to a web form input box to gain access or make changes to data. SQL injection vulnerability allows an attacker to flow commands directly to a web application's underlying database and destroy functionality or confidentiality. Researchers have proposed different tools to detect and prevent this vulnerability. In this paper we present all SQL injection attack types and also current tools which can detect or prevent these attacks. Finally we evaluate these tools.
International journal of engineering research and technology, 2013
The uses of web application has become increasingly popular in our daily life as reading news paper, reading magazines, making online payments for shopping etc. At the same time there is an increase in number of attacks that target them. In particular, SQL injection, a class of code injection attacks in which specially crafted input strings result in illegal queries to a database, has become one of the most serious threats to web applications. This paper proposes a novel specification-based methodology for the prevention of SQL injection Attacks. The two most important advantages of the new approach against existing analogous mechanisms are that, first, it prevents all forms of SQL injection attacks; second, Current technique does not allow the user to access database directly in database server. The innovative technique “Web Service Oriented XPATH Authentication Technique” is to detect and prevent SQL Injection Attacks in database the deployment of this technique is by generating f...
2012
Abstract—SQL injection is a type of attack which the attacker adds Structured Query Language code to a web form input box to gain access or make changes to data. SQL injection vulnerability allows an attacker to flow commands directly to a web application's ...
International Journal of Advances in Computer Science and Technology, 2019
SQL injection is that kind of strategy in which SQL code is inserted into web-based applications that uses server-side database. Such web applications settle for user input like form then place these user inputs in the database requests. SQL statements are executed in such a manner that wasn't supposed or anticipated by the applying developer that tries to subvert the link between a webpage and its supporting database, therefore the database is tricked into execution malicious code due to the poor design of application. The proposed system depends on protection site at run time, before inclusion of user input with database by validating, encoding, filtering the content, escaping single quotes, limiting the input character length, and filtering the exception messages. The proposed answer is effectiveness and measurability additionally it's simply adopted by application programmers. For empirical analysis, we offer a case study of our answer and implement in hypertext markup language, PHP, My Sql, Apache Server and Jmeter application.
2015
Abstract—The Internet and web applications are playing very important role in our today‘s modern day life. Several activities of our daily life like browsing, online shopping and booking of travel tickets are becoming easier by the use of web applications. Most of the web applications use the database as a back-end to store critical information such as user credentials, financial and payment information, company statistics etc. An SQL injection attack targets web applications that are database-driven. This is done by including portions of SQL statements in a web form entry field in an attempt to get the website to pass a newly formed rogue SQL command to the database. Multiple client side and server side vulnerabilities like SQL injection and cross site scripting are discovered and exploited by malicious users. The principle of basic SQL injection is to take advantage of insecure code on a system connected to the internet in order to pass commands directly to a database and to then ...
IJCI. International Journal of Computers and Information
With the recent rapid increase of interactive web applications that employ back-end database services, a SQL injection attack has become one of the most serious security threats. This type of attack can compromise confidentiality and integrity of information and database. Actually, an attacker intrudes to the web application database and consequently, access to data. For preventing this type of attack different techniques have been proposed by researchers but they are not enough because most of implemented techniques cannot stop all type of attacks. In this paper our proposed technique are detection of SQL injection and prevention based on first order, second order and blind SQL injection attacks online. The proposed technique implemented in JAVA and evaluated for seven types of SQL injection attacks. Experimental results have shown that the proposed technique is efficient related to execution time overhead. Our technique need to be one second overhead to execution time. Moreover, we have compared the proposed technique with the popular web application vulnerabilities scanner techniques. The most advantages of proposed technique Its easiness to adopt by software developer, having the same syntactic structure as current popular record set retrieval methods.
2010
Data security has become a topic of primary discussion for security expert. Vulnerabilities are pervasive resulting in exposure of organizations and firms to a wide array of risks. Code Injection attack, a major concern for web security, occurs when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or when user input is not strongly typed and thereby unexpectedly executed, causing an error due to improper setup or coding such that the system fails to handle or properly respond to exceptional or unexpected data or conditions, which results in a situation wherein user credentials can be captured by injecting exceptional data. In spite of many tools and techniques, attacks on web application especially through SQL Injection Attacks are at a rise. Threat modeling is an important risk assessment and mitigation practice that provides the capability to secure a web application. A comprehensively designed threat model can provide a bet...
2010 3rd International Conference on Computer Science and Information Technology, 2010
SQL Injection Attacks (SQLIAs) is one of the most serious threats to the security of database driven applications. In fact, it allows an attacker to gain control over the database of an application and consequently, an attacker may be able to alter data. Many surveys have addressed this problem. Also some researchers have proposed different approaches to detect and prevent this vulnerability but they are not successful completely. Moreover, some of these approaches have not implemented yet and users would be confused in choosing an appropriate tool. In this paper we present all SQL injection attack types and also different tools which can detect or prevent these attacks. Finally we assessed addressing all SQL injection attacks type among current tools.
International Journal of Database Management Systems, 2014
SQL injection is a type of attacks used to gain, manipulate, or delete information in any data-driven system whether this system is online or offline and whether this system is a web or non-web-based. It is distinguished by the multiplicity of its performing methods, so defense techniques could not detect or prevent such attacks. The main objective of this paper is to create a reliable and accurate hybrid technique that secure systems from being exploited by SQL injection attacks. This hybrid technique combines static and runtime SQL queries analysis to create a defense strategy that can detect and prevent various types of SQL injection attacks. To evaluate this suggested technique, a large set of SQL queries have been executed through a simulation that had been developed. The results indicate that the suggested technique is reliable and more effective in capturing more SQL injection types compared to other SQL injection detection methods.
Proceedings of the 2010 2nd International Conference on Computational Intelligence Communication Systems and Networks, 2010
Database driven web application are threaten by SQL Injection Attacks (SQLIAs) because this type of attack can compromise confidentiality and integrity of information in databases. Actually, an attacker intrudes to the web application database and consequently, access to data. For stopping this type of attack different approaches have been proposed by researchers but they are not enough because usually they have limitations. Indeed, some of these approaches have not implemented yet and also most of implemented approaches cannot stop all type of attacks. In this paper all type of SQL injection attack and also different approaches which can detect or prevent them are presented. Finally we evaluate these approaches against all types of SQL injection attacks and deployment requirements.
2013
SQL injection attacks are a serious security threat to Web applications. They allow attackers to gain unrestricted access to the databases underlying the applications and to retrieve sensitive information from databases. Many researchers and practitioners have proposed various methods to solve the SQL injection problem, current ways either fail to solve the full scope of the problem or have limitations that prevent their use. Many researchers and practitioners are familiar with only a subset of the wide range of techniques available to attackers who are trying to take advantage of SQL injection vulnerabilities. Many solutions proposed in the literature solve only some of the issues related to SQL injection. To solve this problem, we give an extensive review of the different types of SQL injection attacks. For each type of attack, we provide descriptions and examples of how attacks of that type could be performed. We also analyze existing detection and prevention techniques against S...
Journal of Computer and Communications, 2014
Structured Query Language Injection Attack (SQLIA) is the most exposed to attack on the Internet. From this attack, the attacker can take control of the database therefore be able to interpolate the data from the database server for the website. Hence, the big challenge became to secure such website against attack via the Internet. We have presented different types of attack methods and prevention techniques of SQLIA which were used to aid the design and implementation of our model. In the paper, work is separated into two parts. The first aims to put SQLIA into perspective by outlining some of the materials and researches that have already been completed. The section suggesting methods of mitigating SQLIA aims to clarify some misconceptions about SQLIA prevention and provides some useful tips to software developers and database administrators. The second details the creation of a filtering proxy server used to prevent a SQL injection attack and analyses the performance impact of the filtering process on web application.
Anti SQL IA Vaccine is a new concept for Detection and Prevention of SQL Injection Attacks on development phase itself‖ which helps and manages the important private customer data in a secured manner by mirroring the important database structures into unique secure mirroring tables which is managed in a differently managed secure data management system which runs on same or different servers. An independently managed verification tool is used to inspect and search the possibility of an SQL injection in the source code of the webpages at the development phase itself. This plays an effective medium in the prevention and detection of SQL Injection, which is one of the major web attack terminology which is effectively utilized by various malwares and hackers to steal valuable data from websites of various organizations which manages their transactions through online and web databases. These are unique type of intrusion that takes advantage of improperly managed/amateur coding in the web applications. SQLIA allows intruders to inject SQL commands into access data’s from the web forms to allow them to gain access to the data held within your database. In this paper we will discuss several types of SQLIAs, existing techniques and their drawbacks. Finally I have proposed a solution for SQLIA detection using data dictionary and prevention using the intrusion search along with SQL vaccine. I have implemented it using ASP.net with VB.net and SQL Server 2008, although this algorithm can be implemented in any language and for any database platform with minimal modifications.
— Web applications witnessed a rapid growth for online business and transactions are expected to be secure, efficient and reliable to the users against any form of injection attacks. SQL injection is one of the most common application layer attack techniques used today by hackers to steal data from organizations. It is a technique that exploits a security vulnerability occurring in the database layer of a web application. The attack takes advantage of poor input validation in code and website administration. It allows attackers to obtain illegitimate access to the backend database to change the intended application generated SQL queries.. In spite of the development of different approaches to prevent SQL injection, it still remains a frightening risk to web applications. In this paper, we present a detailed review on various types of SQL injection attacks, detection and prevention techniques, and their comparative analysis based on the performance and practicality.
2022 5th International Conference on Advances in Science and Technology (ICAST), 2022
An SQL Injection attack is a database focused attack for programmes that utilise data. It is accomplished by inserting malicious lines of code into the SQL query to alter and modify its meaning, allowing the attacker to gain access to the database or retrieve sensitive data. Many strategies for detecting and preventing such assaults have been developed and suggested. This study provides an in depth examination of 38 publications on approaches for detecting SQL Injection in web applications. This offers a foundation for designing and using efficient SQL Injection, detection and prevention techniques.
Indonesian Journal of Electrical Engineering and Computer Science, 2021
SQL injections attacks have been rated as the most dangerous vulnerability of web-based systems over more than a decade by OWASP top ten. Though different static, runtime and hybrid approaches have been proposed to counter SQL injection attacks, no single approach guarantees flawless prevention/ detection for these attacks. Hundreds of components of open source and commercial software products are reported to be vulnerable for SQL injection to CVE repository every year. In this mapping study, we identify different existing approaches in terms of the cost of computation and protection offered. We found that most of the existing techniques claim to offer protection based on the testing on a very small or limited scale. This study dissects each proposed approach and highlights their strengths and weaknesses and categorizes them based on the underlying technology used to detect or counter the injection attacks.
Many software systems have evolved as Web-based t that makes them available to the public via the Internet and can expose them to a variety of Web-based attacks. One of these attacks is SQL Injection vulnerability (SQLIV), which can give attackers unrestricted access to the databases that underlie Web applications and has become increasingly frequent and serious. The intent is that Web applications will limit the kinds of queries that can be generated to a safe subset of all possible queries, regardless of what input user provides. SQL Injection attacks are possible due to the design drawbacks of the web sites, which interact with back-end databases. Successful attacks may damage more. We introduce a system that deals with new automated technique for preventing SQL Injection Attacks based on the novel concept of regular expressions is to detect SQL Injection attacks. The proposed system can detect the attacks that are from Internet and Insider Attacks, by analyzing the packets of the network servers.
Advances in Science, Technology and Engineering Systems Journal
The security of website application has become important in the last decades. According to the Open Web Application Security Project (OWASP), the SQL Injection is classified as one of the major vulnerabilities found in web application security. This research is focused on improving website security in dealing with SQL Injection attacks by stopping, monitoring, and dividing types of SQL Injection attacks using the features provided by the proposed Web Application Firewall (WAF). The architecture is designed to detect and prevent some types of SQL Injection attacks, including Tautologies, Logically Incorrect Queries, Union Queries, Piggy Backed Queries, Stored Procedures. For the testing scenario, this experiment uses an application that has become an industry standard in identifying and validating security holes on a website. The result of this research is that the proposed system is able to increase the website security from SQL Injection.
International journal of engineering research and technology, 2014
SQL Injection has been always as the top threat in any web site and web application. In this paper we are making a dummy web site and injecting some SQL queries, detecting the SQL injection using the IP tracking method, preventing SQL injection using different types of defense mechanism. We have made the dummy website to inject, detect and prevent the SQL injection attacks. We are also giving the internal view where it is required to explain these attacks, the detection and defense mechanism through the explanation of the source codes.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.