2013
DOI: 10.7763/ijcce.2013.v2.244
|View full text |Cite
|
Sign up to set email alerts
|

Study of SQL Injection Attacks and Countermeasures

Abstract: Abstract-SQL injection is an attack technique that exploits a security vulnerability occurring in the database layer of an application and a service. This is most often found within web pages with dynamic content. This paper provides taxonomy on SQL injection prevention and detection approaches. Furthermore, for each type of vulnerability, we provide descriptions of how attacks of that type could take advantage of that vulnerability and perform attack. We also present and analysis some of existing detection an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0
2

Year Published

2015
2015
2023
2023

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(4 citation statements)
references
References 7 publications
0
2
0
2
Order By: Relevance
“…SQL injection is a technique for exploiting security vulnerabilities at the database layer of an application [7]. This cybercrime threat can occur because of inputs that are not properly filtered in its manufacture, so it creates a loophole that can be abused [8], an example of which can be seen in In the absence of a filter on the website url, most likely, the website is vulnerable to SQL injection [9]. For example can be seen in Figure 1, the address www.example/id.php?=1, behind the url address, there is a GET method, meaning that the url is requesting access to the database with the syntax, "Select * from example where id =1, here the database returns a value, to display all tables with id = 1, therefore, if the attacker knows the structure of the website's database, then the attacker can retrieve all existing data in the database of the attacked website [10].…”
Section: Sql Injectionmentioning
confidence: 99%
See 1 more Smart Citation
“…SQL injection is a technique for exploiting security vulnerabilities at the database layer of an application [7]. This cybercrime threat can occur because of inputs that are not properly filtered in its manufacture, so it creates a loophole that can be abused [8], an example of which can be seen in In the absence of a filter on the website url, most likely, the website is vulnerable to SQL injection [9]. For example can be seen in Figure 1, the address www.example/id.php?=1, behind the url address, there is a GET method, meaning that the url is requesting access to the database with the syntax, "Select * from example where id =1, here the database returns a value, to display all tables with id = 1, therefore, if the attacker knows the structure of the website's database, then the attacker can retrieve all existing data in the database of the attacked website [10].…”
Section: Sql Injectionmentioning
confidence: 99%
“…There are several types of security testing, first one is vulnerability Scanning is a security test carried out through automated software to scan a web application to look for vulnerabilities such as SQL Injection, Cross Site Scripting, and other vulnerabilities [17], second is security scanning is a scan used to find vulnerabilities or unwanted file modifications in web-based applications, websites, networks, or file systems, third is penetration testing is a testing process by simulating a cyber attack on the system to be tested. This test will be carried out manually by a professional and certified pentester using various pentest tools and techniques [8], fourth is risk assessment through risk assessment, security risks faced by applications, software, and networks will be identified and analyzed. The security risks will then be classified into several categories, namely high, medium, and low [18], fifth security auditing is a structured method for evaluating security measures within a company [19], next one is ethical hacking is a security test carried out using all hacking techniques and other related computer attack techniques [20].…”
Section: Security Assessment / Testingmentioning
confidence: 99%
“…Analizirajući sintaksu stabla raščlanjivanja SQL upita, moguće je generirati precizne zahtjeve za točnim napadom (Sajjadi, Pour, 2013).…”
Section: Candidunclassified
“…Kroz te mehanizme uzimaju se prednosti obje strategije kako bi klasificiranje SQL upita bilo što pouzdanije. Konačno, kako bi se SQL upiti klasificirali kao nepovjerljivi, koristi se mehanizam virtualizacije koja kombinira tehnike klasteriranja i neuronskih modela koji su bez nadzora (Sajjadi, Pour, 2013).…”
Section: Aiida-sqlunclassified