2014
DOI: 10.4236/jcc.2014.28001
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of SQL Injection Attack Detection and Prevention

Abstract: Structured Query Language Injection Attack (SQLIA) is the most exposed to attack on the Internet. From this attack, the attacker can take control of the database therefore be able to interpolate the data from the database server for the website. Hence, the big challenge became to secure such website against attack via the Internet. We have presented different types of attack methods and prevention techniques of SQLIA which were used to aid the design and implementation of our model. In the paper, work is separ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 23 publications
(6 citation statements)
references
References 5 publications
(5 reference statements)
0
6
0
Order By: Relevance
“…The interactivity of online services accepts input from users, which gives hackers a chance to steal data from a venerable system by using injection attacks [22] . To prevent this, end-user devices should validate all user input, permit only minimally privileged accounts to send user input to the server, and run SQL Server with the least necessary privileges [23] .…”
Section: Security Issues and Solutionsmentioning
confidence: 99%
“…The interactivity of online services accepts input from users, which gives hackers a chance to steal data from a venerable system by using injection attacks [22] . To prevent this, end-user devices should validate all user input, permit only minimally privileged accounts to send user input to the server, and run SQL Server with the least necessary privileges [23] .…”
Section: Security Issues and Solutionsmentioning
confidence: 99%
“…In line with a standard nomenclature adopted for the database objects, the database and tables were named hssfi_organo_database and hssfi_organo_table respectively. The SQL CREATE command [17] was used in creating these two objects. An important precaution is the issuance of a windows command \c in between database and table creation sessions.…”
Section: System Implementationmentioning
confidence: 99%
“…Traditionally, code injection detection is done via static analysis and signature-based detection as well as design of the web application, so as to [14]:…”
Section: Related Workmentioning
confidence: 99%