Journal of Computer and Communications

Volume 2, Issue 8 (June 2014)

ISSN Print: 2327-5219   ISSN Online: 2327-5227

Google-based Impact Factor: 1.12  Citations  

A Survey of SQL Injection Attack Detection and Prevention

HTML  XML Download Download as PDF (Size: 426KB)  PP. 1-9  
DOI: 10.4236/jcc.2014.28001    5,644 Downloads   9,254 Views  Citations

ABSTRACT

Structured Query Language Injection Attack (SQLIA) is the most exposed to attack on the Internet. From this attack, the attacker can take control of the database therefore be able to interpolate the data from the database server for the website. Hence, the big challenge became to secure such website against attack via the Internet. We have presented different types of attack methods and prevention techniques of SQLIA which were used to aid the design and implementation of our model. In the paper, work is separated into two parts. The first aims to put SQLIA into perspective by outlining some of the materials and researches that have already been completed. The section suggesting methods of mitigating SQLIA aims to clarify some misconceptions about SQLIA prevention and provides some useful tips to software developers and database administrators. The second details the creation of a filtering proxy server used to prevent a SQL injection attack and analyses the performance impact of the filtering process on web application.

Share and Cite:

Elshazly, K. , Fouad, Y. , Saleh, M. and Sewisy, A. (2014) A Survey of SQL Injection Attack Detection and Prevention. Journal of Computer and Communications, 2, 1-9. doi: 10.4236/jcc.2014.28001.

Cited by

[1] An Interpretive Saga of SQL Injection Attacks
Emerging Technologies in Data Mining and Information …, 2023
[2] A survey on SQL injection attacks, detection and prevention techniques-a tertiary study
International Journal of Security and …, 2022
[3] Classification of SQL injection attack using K-Means clustering algorithm
AIP Conference …, 2022
[4] CYBER ATTACKS-TRENDS, PATTERNS, AND SECURITY COUNTERMEASURES
2021
[5] A Novel Approach for SQL Injection Avoidance Using Two-Level Restricted Application Prevention (TRAP) Technique
2021
[6] PHP Development of Tourism Culture Website under the background of Modern Computer Network Technology
2021 2nd International Conference on Smart …, 2021
[7] Implementation and Analysis ModSecurity on Web-Based Application with OWASP Standards
JATISI (Jurnal Teknik …, 2021
[8] Hierarchical Database Construction and Retrieval
International …, 2020
[9] A Novel Approach for SQL Injection Avoidance Using Two-Level Restricted Application Prevention (TRAP)
2020
[10] WebApplication Vulnerabilities: Exploitation and Prevention
2020
[11] Secure and anonymous authentication scheme for the Internet of Things with pairing
2020
[12] Anomaly-Based Method for Detecting Multiple Classes of Network Attacks
2019
[13] Analisi dell'equilibrio nell'applicazione della teoria dei giochi alle strategie di friendly jamming
2019
[14] CODDLE: Code-Injection Detection With Deep Learning
2019
[15] Detecting the Abnormal SQL Query Using Hybrid SVM Classification Technique in Web Application
2019
[16] Обнаружение атаки SQL injection на веб-сервер без инспекции трафика
2018
[17] Prevention of DDoS and SQL Injection Attack By Prepared Statement and IP Blocking
2018
[18] Design of a security system for Web Attacks
2018
[19] PREVENTION OF DDoS AND SQL INJECTION ATTACK BY PREPARED STATEMENT AND IP BLOCKING.
Journal on Software Engineering, 2018
[20] An Agent Based Intelligent Dynamic Vulnerability Analysis Framework for Critical SQLIA Attacks: Intelligent SQLIA Vulnerability Analyzer Agent
International Journal of Intelligent Information Technologies (IJIIT), 2018
[21] Prevention Structured Query Language Injection Using Regular Expression and Escape String
Procedia Computer Science, 2018
[22] A comprehensive study of cyber attacks & counter measures for web systems
ICFNDS 2018 Proceedings of the 2nd International Conference on Future Networks and Distributed Systems, 2018
[23] A study on web application security and detecting security vulnerabilities
2017
[24] Neutralizing SQL Injection Attack Using Server Side Code Modification in Web Applications
Security and Communication Networks, 2017
[25] BİLGİ SİSTEMLERİNDE GÜNCEL GÜVENLİK PROBLEMLERİ VE ÖNERİLEN ÇÖZÜMLER
TüBAV Bilim Dergisi, 2017
[26] SQL filtering: An effective technique to prevent SQL injection attack
2016
[27] 数据挖掘提取查询树特征的 SQL 注入攻击检测
电子技术应用, 2016
[28] STUDY ON SQL INJECTION ATTACKS: MODE, DETECTION AND PREVENTION
International Journal of Engineering Applied Sciences and Technology , 2016
[29] ANALYSIS OF VARIOUS LEVELS OF PENETRATION BY SQL INJECTION TECHNIQUE THROUGH DVWA
Journal of Advanced Computing and Communication Technologies, 2016
[30] Neutralizing SQL Injection Attack using Server Side Code Modification in Web Applications.
Security and Communication Networks, 2016
[31] Analysis of various levels of penetration by SQL injection technique through DVWA'
2016
[32] Assessing Web Services Robustness and Security Using Malicious Data Injection
2015
[33] Detection and Prevention of SQL Injection Using Auto Comparator
2014
[34] Neutralizing SQL Injection Attack using Server Side Code...
[35] A Theory of Injection-Based Vulnerabilities in Formal Grammars
[36] Security and Privacy in Metaverse: A Comprehensive Survey

Copyright © 2023 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.