A Review on Methods for Prevention of SQL Injection Attack

Authors

  • Prof. Sweta Raut  Assistant Professor, Computer Science and Engineering, Nagpur Institute of Technology, Nagpur, Maharashtra, India
  • Akshay Nikhare  Student, Computer Science and Engineering, Nagpur Institute of Technology, Nagpur, Maharashtra, India
  • Yogesh Punde  Student, Computer Science and Engineering, Nagpur Institute of Technology, Nagpur, Maharashtra, India
  • Snehal Manerao  Student, Computer Science and Engineering, Nagpur Institute of Technology, Nagpur, Maharashtra, India
  • Shubham Choudhary  Student, Computer Science and Engineering, Nagpur Institute of Technology, Nagpur, Maharashtra, India

DOI:

https://doi.org//10.32628/IJSRST196258

Keywords:

SQL Injection attack, Pattern matching, Aho-Corasick algorithm

Abstract

Web applications generally interact with backend information to retrieve persistent data and then present the information to the user as dynamically generated output, like HTML websites. This communication is commonly done through a low–level API by dynamically constructing query strings within a general-purpose programming language. SQL Injection Attack (SQLIA) is one of the very serious threats to web applications. This paper is a review on preventing technique for a SQL injection attack which can secure web applications against SQLimplantation. This paper also demonstrates a technique for preventing SQL Injection Attack (SQLIA) using Aho–Corasick pattern matching algorithm

References

  1. M. A. Prabakar, M. KarthiKeyan, K. Marimuthu, "An Efficient Technique for Preventing SQL Injection Attack Using Pattern Matching Algorithm", IEEE Int. Conf. on Emerging Trends in Computing, Communication, and Nanotechnology, 2013. 
  2. E. Bertino, A. Kamra, and J. Early, "Profiling Database Application to Detect SQL Injection Attacks", In the Proceedings of 2007 IEEE International Performance, Computing, and Communications Conference, 2007.
  3. G. T. Buehrer, B. W. Weide, and P. A. G. Sivilotti, "Using Parse Tree Validation to Prevent SQL Injection Attacks", Computer Science and Engineering, The Ohio State University Columbus, 2005.
  4. J. H. Saltzer, M. D. Schroeder, "The Protection of Information in Computer Systems", In Proceedings of the IEEE, 2005.
  5. Kamra, E. Bertino, and G. Lebanon, "Mechanisms for Database Intrusion Detection and Response", in the Proceedings of the 2nd SIGMOD Ph.D. Workshop on Innovative Database Research, 2008.
  6. S. Axelsson, "Intrusion detection systems: A survey and taxonomy", Technical Report, Chalmers University, 2000.
  7. S. F. Yusufovna, "Integrating Intrusion Detection System and Data Mining", IEEE Ubiquitous Multimedia Computing, 2008.
  8. W. G. J. Halfond and A. Orso, "AMNESIA: Analysis and Monitoring for Neutralizing SQL Injection Attacks", College of Computing, Georgia Institute of Technology, 2005.
  9. W. G. J. Halfond and A. Orso, "Combining Static Analysis and Runtime Monitoring to Counter SQL Injection Attacks", College of Computing, Georgia Institute of Technology, 2005.
  10. W. G. J. Halfond, A. Orso, and P. Manolios, "Using Positive Tainting and Syntax-Aware Evaluation to Counter SQL Injection Attacks", Proceedings of the 14th ACM SIGSOFT international symposium on Foundations of software engineering, 2006.
  11. V. Aho and Margaret J. Corasick, "Efficient string matching: An aid to bibliographic search", Communications of the ACM, 1975.

Downloads

Published

2019-04-30

Issue

Section

Research Articles

How to Cite

[1]
Prof. Sweta Raut, Akshay Nikhare, Yogesh Punde, Snehal Manerao, Shubham Choudhary, " A Review on Methods for Prevention of SQL Injection Attack, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 6, Issue 2, pp.463-470, March-April-2019. Available at doi : https://doi.org/10.32628/IJSRST196258