2017
DOI: 10.7763/ijcte.2017.v9.1165
|View full text |Cite
|
Sign up to set email alerts
|

SQL Injection Attacks Detection & Prevention Techniques

Abstract: Abstract-SQL Injection Attack (SQLIA) is a type of code injection technique that threatens confidentiality, integrity, and availability of web databases. The attacker mostly exploits incorrectly filtered user inputs such as text fields in web applications and tries to insert malicious SQL statements into a legitimate query via the vulnerable user input. By doing so, the attacker can access, insert, modify, or delete critical information in a database without proper authorization. In this survey, we describe an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 13 publications
0
5
0
1
Order By: Relevance
“…En la fase estática, según [32], las consultas SQL generadas por el usuario son comparados con una lista de patrones que contienen una muestra de los patrones de ataque más conocidos. Si la sentencia SQL concuerda exactamente con uno de los patrones dados en la lista de patrones estáticos, significa que se está intentando un ataque SQL.…”
Section: Discussionunclassified
“…En la fase estática, según [32], las consultas SQL generadas por el usuario son comparados con una lista de patrones que contienen una muestra de los patrones de ataque más conocidos. Si la sentencia SQL concuerda exactamente con uno de los patrones dados en la lista de patrones estáticos, significa que se está intentando un ataque SQL.…”
Section: Discussionunclassified
“…The attacker attempts to use a conditional query argument to test always true in the tautology attack, such as (1 = 1) or (− −). The attacker injects the condition and transforms it into a tautology that is always valid using the WHERE clause [91,92]. This type of attack is commonly used to access databases without requiring authentication on websites [1].…”
Section: Tautology Attackmentioning
confidence: 99%
“…In this attack, the attacker tries to use a conditional question argument to test always true in the tautology attack. The attacker injects the condition and transforms it into a tautology that is always valid using the WHERE clause [41] The most common type of tautology attack, the nature of the attack, and the approach used to detect them is described below in table 1.…”
Section: Tautology Attackmentioning
confidence: 99%
“…Different forms of attack under inference query are shown in table 6 below. Blind SQL injection [41] Collect valuable data by inferring from the page's answers after asking the server a set of true/false questions.…”
Section: Stored Procedures Querymentioning
confidence: 99%