We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Recursively Accrual Authentication of Web Application against SQL Injection Attack

by Raut S. P.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 68 - Number 25
Year of Publication: 2013
Authors: Raut S. P.
10.5120/11751-7262

Raut S. P. . Recursively Accrual Authentication of Web Application against SQL Injection Attack. International Journal of Computer Applications. 68, 25 ( April 2013), 22-25. DOI=10.5120/11751-7262

@article{ 10.5120/11751-7262,
author = { Raut S. P. },
title = { Recursively Accrual Authentication of Web Application against SQL Injection Attack },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 68 },
number = { 25 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 22-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume68/number25/11751-7262/ },
doi = { 10.5120/11751-7262 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:28:53.256774+05:30
%A Raut S. P.
%T Recursively Accrual Authentication of Web Application against SQL Injection Attack
%J International Journal of Computer Applications
%@ 0975-8887
%V 68
%N 25
%P 22-25
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Web applications allow legitimate website visitors to submit and retrieve data to/from a database over the Internet. Web applications are used for collecting information, and analyze it. Sql injection is one of the most dangerous attacks which are used to access database without authentication. SQL is used to retrieve; insert data to/from the database . Using sql command make it a malicious code for attack at authentication section of front end of web application and send to the server. This process is known as SQL injection authorization attack. SQL injection authorization attack easily gets entry in the database and catches all information from database. This paper illustrates the method for prevention from SQL injection authorization attack i. e. recursively authentication or double authentication. Automatically authentication will increase. We are going to implement recursive method on web based program using string inputs and its ASCII value

References
  1. HTTP://http://en. wikipedia. org/wiki/SQL_injection; "SQL Injection"
  2. William G. J. ,Halfond and Alessandro Orso. 2005,ASE'05,Long Beach, California, USA,AMNESIA: Analysis and Monitoring for Neutralizing SQL Injection Attacks
  3. IndraniBalasundaram. ,Dr. E. Ramaraj. 2011. An Effective Approach for Protecting Web from SQL Injection Attacks. IJCSNS International Journal of Computer Science and Network Security
  4. Multitier Architecture http://en. wikipedia. org/wiki/Multitier_architecture
  5. VeeraVenkateswarammaP. 2012. An Effective Approach for Protecting Web from SQL Injection Attacks. International Journal of Scientific & Engineering Research
  6. William G. J. Halfond and Alessandro Orso. Combining Static Analysis and Runtime Monitoring to counter Injection Attack
  7. San-Tsai Sun, Ting Han Wei, Stephen Liu, SheungLau. Classification of SQL Injection Attacks
  8. Asha. N, , M. Varun Kumar, Vaidhyanathan. G. 2012 Preventing SQL Injection Attacks. International Journal of Computer Applications.
  9. AmiraRezk, H. A. Ali, S. I. Barakat. 2012. Database Security Protection based ona New Mechanism. International Journal of Computer
  10. Nikita Patel, Fahim Mohammed, SantoshSoni. 2011 SQL Injection Attacks:Techniques and Protection mechanismsInternational Journal on Computer Science and Engineering (IJCSE)
  11. IndraniBalasundaram,E. Ramaraj. 2011. An authentication Mechanism to prevent SQL Injection Attacks. International Journal of Computer Applications
Index Terms

Computer Science
Information Sciences

Keywords

ASCII recursive authentication double authentication