We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Prevention of SQL Injection by Self Generating Triplet Patterns

by Abhay K. Kolhe, Pratik Adhikari
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 93 - Number 15
Year of Publication: 2014
Authors: Abhay K. Kolhe, Pratik Adhikari
10.5120/16289-5526

Abhay K. Kolhe, Pratik Adhikari . Prevention of SQL Injection by Self Generating Triplet Patterns. International Journal of Computer Applications. 93, 15 ( May 2014), 6-8. DOI=10.5120/16289-5526

@article{ 10.5120/16289-5526,
author = { Abhay K. Kolhe, Pratik Adhikari },
title = { Prevention of SQL Injection by Self Generating Triplet Patterns },
journal = { International Journal of Computer Applications },
issue_date = { May 2014 },
volume = { 93 },
number = { 15 },
month = { May },
year = { 2014 },
issn = { 0975-8887 },
pages = { 6-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume93/number15/16289-5526/ },
doi = { 10.5120/16289-5526 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:15:48.166999+05:30
%A Abhay K. Kolhe
%A Pratik Adhikari
%T Prevention of SQL Injection by Self Generating Triplet Patterns
%J International Journal of Computer Applications
%@ 0975-8887
%V 93
%N 15
%P 6-8
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The paper is focused with the new prevention method for SQL injection as it is always the top threat to any web site or web application. The paper focus generation of the pattern from the training query to prevent the SQL injection for the new query by forming triplet pattern. The new concept of matching pattern ratio has been introduced in the paper. In the last section advantages and the disadvantages of the method is discussed.

References
  1. Nontarak, S. Leelawat T, "Securely Web-Based Application for Construction Material Testing" International Journal of Computer Applications (0975 – 8887) Volume 42– No. 11, March 2012 .
  2. http://php. net/manual/en/function. mySQL-real-escape-string. php 26 Nov 2013
  3. http://www. php. net/manual/en/mySQLi. quickstart. multiple-statement. php 26 Nov 2013
  4. Preshika Tiwari, Ashish Kumar Srivastava, " A Survey on Authentication Mechanism against SQL Injection in XML" International Journal of Computer Applications (0975 – 8887) Volume 78 – No. 7, September 2013.
  5. Abhay K. Kolhe, Pratik Adhikari "Injection, Detection, Prevention of SQL Injection Attacks" International Journal of Computer Applications (0975 – 8887) Volume 87 – No. 7, February 2014.
  6. Gaurav Shrivastava, Kshitij Pathak, "SQL Injection Attacks: Technique and Prevention Mechanism" International Journal of Computer Applications (0975 – 8887) Volume 69– No. 7, May 2013.
  7. https://www. owasp. org/index. php/Testing_for_SQL_Injection_(OWASP-DV-005) 16th Feb 2014
  8. http://www. sqlinjectionwiki. com/Categories. aspx?catId=1 16th Feb 2014
  9. http://www. bbc. co. uk/bitesize/higher/biology/cell_biology/rna/revision/2/
Index Terms

Computer Science
Information Sciences

Keywords

SQL injection SQL injection vulnerability web security prevention of SQL injection