SQL injection detection and prevention techniques
SQL injection is a type of attack which the attacker adds Structured Query Language code to a web form input box to gain access or make changes to data. SQL injection vulnerability allows an attacker to flow commands directly to a web application's underlying database and destroy functionality...
Main Authors: | , , |
---|---|
Format: | Article |
Published: |
IEEE
2011
|
Subjects: |
_version_ | 1796856535353131008 |
---|---|
author | Tajpour, Atefeh Ibrahim, Suhaimi Masrom, Maslin |
author_facet | Tajpour, Atefeh Ibrahim, Suhaimi Masrom, Maslin |
author_sort | Tajpour, Atefeh |
collection | ePrints |
description | SQL injection is a type of attack which the attacker adds Structured Query Language code to a web form input box to gain access or make changes to data. SQL injection vulnerability allows an attacker to flow commands directly to a web application's underlying database and destroy functionality or confidentiality. Researchers have proposed different tools to detect and prevent this vulnerability. In this paper we present SQL injection attack types and also current techniques which can detect or prevent these attacks. Finally we evaluate these techniques. |
first_indexed | 2024-03-05T18:44:29Z |
format | Article |
id | utm.eprints-29333 |
institution | Universiti Teknologi Malaysia - ePrints |
last_indexed | 2024-03-05T18:44:29Z |
publishDate | 2011 |
publisher | IEEE |
record_format | dspace |
spelling | utm.eprints-293332022-01-31T08:41:12Z http://eprints.utm.my/29333/ SQL injection detection and prevention techniques Tajpour, Atefeh Ibrahim, Suhaimi Masrom, Maslin QA75 Electronic computers. Computer science SQL injection is a type of attack which the attacker adds Structured Query Language code to a web form input box to gain access or make changes to data. SQL injection vulnerability allows an attacker to flow commands directly to a web application's underlying database and destroy functionality or confidentiality. Researchers have proposed different tools to detect and prevent this vulnerability. In this paper we present SQL injection attack types and also current techniques which can detect or prevent these attacks. Finally we evaluate these techniques. IEEE 2011-08 Article PeerReviewed Tajpour, Atefeh and Ibrahim, Suhaimi and Masrom, Maslin (2011) SQL injection detection and prevention techniques. International Journal of Advancements in Computing Technology, 3 (7). pp. 82-91. ISSN 2005-8039 https://www.scopus.com/record/display.uri?eid=2-s2.0-80052579658&origin=resultslist&sort=plf-f&src=s&st1 |
spellingShingle | QA75 Electronic computers. Computer science Tajpour, Atefeh Ibrahim, Suhaimi Masrom, Maslin SQL injection detection and prevention techniques |
title | SQL injection detection and prevention techniques |
title_full | SQL injection detection and prevention techniques |
title_fullStr | SQL injection detection and prevention techniques |
title_full_unstemmed | SQL injection detection and prevention techniques |
title_short | SQL injection detection and prevention techniques |
title_sort | sql injection detection and prevention techniques |
topic | QA75 Electronic computers. Computer science |
work_keys_str_mv | AT tajpouratefeh sqlinjectiondetectionandpreventiontechniques AT ibrahimsuhaimi sqlinjectiondetectionandpreventiontechniques AT masrommaslin sqlinjectiondetectionandpreventiontechniques |