CFP last date
20 January 2025
Reseach Article

A Survey on Detection and Prevention Techniques of SQL Injection Attacks

by Harish Dehariya, Piyush Kumar Shukla, Manish Ahirwar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 137 - Number 5
Year of Publication: 2016
Authors: Harish Dehariya, Piyush Kumar Shukla, Manish Ahirwar
10.5120/ijca2016908672

Harish Dehariya, Piyush Kumar Shukla, Manish Ahirwar . A Survey on Detection and Prevention Techniques of SQL Injection Attacks. International Journal of Computer Applications. 137, 5 ( March 2016), 9-15. DOI=10.5120/ijca2016908672

@article{ 10.5120/ijca2016908672,
author = { Harish Dehariya, Piyush Kumar Shukla, Manish Ahirwar },
title = { A Survey on Detection and Prevention Techniques of SQL Injection Attacks },
journal = { International Journal of Computer Applications },
issue_date = { March 2016 },
volume = { 137 },
number = { 5 },
month = { March },
year = { 2016 },
issn = { 0975-8887 },
pages = { 9-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume137/number5/24270-2016908672/ },
doi = { 10.5120/ijca2016908672 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:37:33.103805+05:30
%A Harish Dehariya
%A Piyush Kumar Shukla
%A Manish Ahirwar
%T A Survey on Detection and Prevention Techniques of SQL Injection Attacks
%J International Journal of Computer Applications
%@ 0975-8887
%V 137
%N 5
%P 9-15
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Web applications are widely using nowadays. In these web applications, most of those that are based on money transaction like on-line baking, e-shopping, on-line bill payment, Money transfer, etc. The interaction between the web applications and Database is done with Structured Query Language (SQL) and Scripting Language is used. These queries keep sensitive or personal information of various users. So it is necessary to maintain confidentiality from unauthorized access. SQL injection Attack (SQLIA) is the most common type of vulnerability in which crafted query is inserts as input for retrieving personal information about other users. In this paper, various detection and prevention techniques of SQL injection attacks are described and perform a comparison between them.

References
  1. Diksha G. Kumar, Madhumita Chatterjee “Detection Block Model for SQL Injection Attacks” I.J. computer Network and Information Security, 2014
  2. Bojken Shehu, Aleksander Xhuvani “A literature Review and comparaative analysis on SQL injection: Vulnerabiities, attacks and their detection and prevention Techniques” International Journal of Computer Science Issues, Vol 11,Issue 4, no1 2014
  3. Geogiana Buja, Dr. Kamarularifin Bin Abd Jalil, Dr. Fakariah Bt. Hj Mohd Ali, The Faradilla Abdul “Detection model for SQL Injection Attack: An approach for preventing a web application from the SQL injection Attack”IEEE Symposium on Computer Applications and Industrial Electronics, April 2014
  4. Nuno Seixas, Marco Vieira, Jose Fonseca, Henrique Madeira “Analysis of field data on web security vulnerabilities ”IEEE Transactions on Dependable and secure computing Vol. 11 No.2 March/Aril 2014
  5. Hossaian Shahriar, Mohammad Zulkernine, “Information Theoretic Detection of SQL Injection Attacks” International Symposium on high-Assurance systems Engineering, IEEE 2014
  6. Hussein AlNabulsi, Izzat Alsmadi,, Mohammad Al-Jarrah “Textual Manipulation for SQL Injection attack” I.J. computer Network and Information Security, 2014
  7. Monali R. Boradel, Neeta A. Despande “Extensive Review of SQLIA’s Detection and Prevention Techniques” International Journal of Emerging Technology and Advanced Engineering ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 10, October 2013
  8. Shelly Rohilla, Pradeep Kumar Mittal “Database Security by Preventing SQL Injection Attacks in Stored Procedure” Journal of Advanced Research in Computer Science and software Engineering Volume 3, Issue 11 November 2013.
  9. Jaskanwal Minhas Raman Kumar “Blocking of SQL Injection attack by Comparing Static and Dynamic queries” International Journal of computer network and Information Security 2013
  10. Mihir Gandhi, Jwalant Baria “SQL INJECTION Attacks in Web application”International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-6, January 2013”
  11. Srinivas Avireddy, Varalaxhmi perumal, Narayan Gowraj, Ram Srivastava Kannan“Random4: An Application Specific Randomized Encryption Algorithm to prevent SQL Injection” 11th International conference on trust, Security and privacy in computing and communications IEEE 2012.
  12. Atefeh Tajpour, Suhaimi Ibrahim, Mohammad Sharifi “Web Application security by SQL Injection Detection tools” International Journal of Computer science Issue, Volume 9 Issue 2 No 3 March 2012
  13. Neha Singh, Ravindra Kumar Purwar “SQL Injections – A Hazard to web application” International Journal of Advanced Research in computer Science and Software Engineering Volume 2, Issue 6, June 2012
  14. Iyano Alessandro Elia, Jose Fonseca and Marco Vieira “Computing SQL Injection Detection Tools Using Attack Injection: An Experimental study” IEEE International Symposium on software reliability Engineering 2012
  15. Kanchana Natrajan, Sarala Subramani “Generation of SQL injection free secure algorithm to detect and prevent SQL Injection attack” ELESE VIER C3IT-2012
  16. Inyong Lee, Soonki Jeong, Sangsoo Yeo, Jongsub Moon “A novel method for SQL Injection attack detection based on removing SQL Query attribute values”, ELSEVIER 2012.
  17. Qian XUE, Peng HE “On Defence and Detection of SQL Server Injection Attack” IEEE 2011
  18. Jie Wang, Raphael C.W. Phan, John N Whitley, David J. Parish “Augmented Attack Tree Modelling of SQL Injection Attacks” IEEE 2010
  19. Atefeh Tajpour, Maslin Masrom, Suhaimi Ibrahim, Mohammad Sharifi “SQL injection detection and prevention Tools Assessments” IEEE 2010.
  20. Ntagwabira Lambert, Kang Song Lin “Use of Query Tokenization to detect and prevent SQL Injection attacks” IEEE 2010
  21. J. Fonseca, M. Vieira, and H. Madeira, “The web Attacker Perspective –A Field study” IEEE 2010.
  22. Michelle Ruse, Tanmoy Sarkar, Samik Basu“Analysis and Detection of SQL Injection Vulnerabilities via Automatic Test Case Generation of Programs”. Annual International Symposium on application and the Internet. 2010
  23. Nuno Auntunes, Nuno Laranjeiro, Marco Vieira, Henrique Madeira “Effective detection of SQL /X Path Injection Vulnerabilities in web services” IEEE International conference on services computing 2009.
  24. A. Roichman E. Gudes, “DIWeDa –Detecting Intrusions in Web Databases”. Vol. 5094, pp. 313-329 Springer Heidelberg 2008J. Fonseca and Marco Vieira “Mapping software fault with web security vulnerabilities” IEEE conference on dependable system and network, June 2008
  25. J. Fonseca and Marco Vieira and Henrique Madeira “Training Security Assurance Team using Vulnerability Injection” IEEE Pacific Rim Dependable Computing, December 2008
  26. P. Grazie “SQL Prevent Thesis” University of Columbia, Vancouver, Canada 2008
  27. Prithvi Bisht, P. Madhusudan, V N. Venkatraman, Sruthi Bandhakavi “CANDID Preventing SQL injection Attack using Dynamic Candidate Evaluations” ACM Transactions on Information and Security (TISSEC) October/November 2007
  28. Fonseca, J. Vieira, M. Madeira, “H. Testing and Comparing Web Vulnerability Scanning Tools for SQL Injection and XSS Attacks” IEEE Dec. 2007.
  29. J. Duraes, H. Madeira “Emulation of software faults: A field study and practical approach” IEEE transaction vol. 32 no.11 pages 849-867 November 2006
  30. T. Pietraszek, C. V. Berghe. “Defending against Injection Attacks Trough Context-Sensitive String Evaluation” Recent Advanced in Intrusion Detection Volume: 3858, 2006
  31. William G. Halfond and Alessandro Orso “AMNESIA: Analysis and Monitoring for NEutrializing SQL Injection Attacks” pages 22-28 St. Louis, MO, USA, May 2005
  32. McClure and I. H. Kruger, “SQL DOM: Compile time checking and dynamic SQL statements” Software Engineering ICSE 2005.
  33. Yao-Wen Huang, Fang Yu, Christian Hang, Chuang Hang, Tsai, D.T. Lee, Sy-Yen Kuo “Securing Web Application Code by Static Analysis and Runtime Protection” 13th conference on World wide web in ACM New York USA 2004.
  34. Y. Huang S. Huang T. Lin and C. Tsai, “Web Application security Assessment by Fault Injection and Behavior" In Proceeding of the 11th International World Wide Web Conference, May 2003.
Index Terms

Computer Science
Information Sciences

Keywords

Web Application SQL Injection Vulnerabilities Detection and Prevention techniques.