National Conference on Advances in Computing Communication and Application |
Foundation of Computer Science USA |
ACCA2015 - Number 1 |
April 2015 |
Authors: Anju Muraleedharan, Neetha K N |
85f87931-bf29-449c-9c27-a491796b750b |
Anju Muraleedharan, Neetha K N . A Robust Method for Prevention of Second Order and Stored Procedure based SQL Injections. National Conference on Advances in Computing Communication and Application. ACCA2015, 1 (April 2015), 20-23.
Today's interconnected computer network is complex and is constantly growing in size . As per OWASP Top10 list 2013[1] the top vulnerability in web application is listed as injection attack. SQL injection[2] is the most dangerous attack among injection attacks. Most of the available techniques provide an incomplete solution. While attacking using SQL injection attacker probably use space, single quotes or double dashes in his input so as to change the indented meaning of the runtime query generated based on these inputs. Stored procedure based and second order SQL injection are two types of SQL injection that are difficult to detect and hence difficult to prevent. This work concentrates on Stored procedure based and second order SQL injection. It uses a Similarity analysis technique to detect injection. The runtime generated query is checked against a query model for similarity analysis and if both are similar then the runtime query is free from injection else query is vulnerable and the further processing of the query is blocked.