Review of SQL injection : problems and prevention
SQL injection happened in electronic records in database and it is still exist even after two decades since it first happened. Most of the web-based applications are still vulnerable to the SQL injection attacks. Although technology had improved a lot during these past years, but, hackers still can...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Politeknik Negeri Padang
2018
|
Subjects: | |
Online Access: | http://eprints.uthm.edu.my/5635/1/AJ%202018%20%28281%29.pdf |
_version_ | 1825710054439911424 |
---|---|
author | Mohd Yunus, Mohd Amin Brohan, Muhammad Zainulariff Mohd Nawi, Nazri Mat Surin, Ely Salwana Md Najib, Nurhakimah Azwani Chan, Wei Liang |
author_facet | Mohd Yunus, Mohd Amin Brohan, Muhammad Zainulariff Mohd Nawi, Nazri Mat Surin, Ely Salwana Md Najib, Nurhakimah Azwani Chan, Wei Liang |
author_sort | Mohd Yunus, Mohd Amin |
collection | UTHM |
description | SQL injection happened in electronic records in database and it is still exist even after two decades since it first happened. Most of the web-based applications are still vulnerable to the SQL injection attacks. Although technology had improved a lot during these past years, but, hackers still can find holes to perform the SQL injection. There are many methods for this SQL injection to be performed by the hackers and there is also plenty of prevention for the SQL injection to be happened. The vulnerability to SQL injection is very big and this is definitely a huge threat to the web based application as the hackers can easily hacked their system and obtains any data and information that they wanted anytime and anywhere. This paper can conclude that several proposed techniques from existing journal papers used for preventing SQL injection. Then, it comes out with Blockchain concept to prevent SQL injection attacks on database management system (DBMS) via IP. |
first_indexed | 2024-03-05T21:51:47Z |
format | Article |
id | uthm.eprints-5635 |
institution | Universiti Tun Hussein Onn Malaysia |
language | English |
last_indexed | 2024-03-05T21:51:47Z |
publishDate | 2018 |
publisher | Politeknik Negeri Padang |
record_format | dspace |
spelling | uthm.eprints-56352022-01-19T05:20:33Z http://eprints.uthm.edu.my/5635/ Review of SQL injection : problems and prevention Mohd Yunus, Mohd Amin Brohan, Muhammad Zainulariff Mohd Nawi, Nazri Mat Surin, Ely Salwana Md Najib, Nurhakimah Azwani Chan, Wei Liang QA76 Computer software SQL injection happened in electronic records in database and it is still exist even after two decades since it first happened. Most of the web-based applications are still vulnerable to the SQL injection attacks. Although technology had improved a lot during these past years, but, hackers still can find holes to perform the SQL injection. There are many methods for this SQL injection to be performed by the hackers and there is also plenty of prevention for the SQL injection to be happened. The vulnerability to SQL injection is very big and this is definitely a huge threat to the web based application as the hackers can easily hacked their system and obtains any data and information that they wanted anytime and anywhere. This paper can conclude that several proposed techniques from existing journal papers used for preventing SQL injection. Then, it comes out with Blockchain concept to prevent SQL injection attacks on database management system (DBMS) via IP. Politeknik Negeri Padang 2018 Article PeerReviewed text en http://eprints.uthm.edu.my/5635/1/AJ%202018%20%28281%29.pdf Mohd Yunus, Mohd Amin and Brohan, Muhammad Zainulariff and Mohd Nawi, Nazri and Mat Surin, Ely Salwana and Md Najib, Nurhakimah Azwani and Chan, Wei Liang (2018) Review of SQL injection : problems and prevention. International Journal on Informatics Visualization, 2 (3). pp. 215-219. ISSN 2549-9610 |
spellingShingle | QA76 Computer software Mohd Yunus, Mohd Amin Brohan, Muhammad Zainulariff Mohd Nawi, Nazri Mat Surin, Ely Salwana Md Najib, Nurhakimah Azwani Chan, Wei Liang Review of SQL injection : problems and prevention |
title | Review of SQL injection : problems and prevention |
title_full | Review of SQL injection : problems and prevention |
title_fullStr | Review of SQL injection : problems and prevention |
title_full_unstemmed | Review of SQL injection : problems and prevention |
title_short | Review of SQL injection : problems and prevention |
title_sort | review of sql injection problems and prevention |
topic | QA76 Computer software |
url | http://eprints.uthm.edu.my/5635/1/AJ%202018%20%28281%29.pdf |
work_keys_str_mv | AT mohdyunusmohdamin reviewofsqlinjectionproblemsandprevention AT brohanmuhammadzainulariff reviewofsqlinjectionproblemsandprevention AT mohdnawinazri reviewofsqlinjectionproblemsandprevention AT matsurinelysalwana reviewofsqlinjectionproblemsandprevention AT mdnajibnurhakimahazwani reviewofsqlinjectionproblemsandprevention AT chanweiliang reviewofsqlinjectionproblemsandprevention |