IJSRD - International Journal for Scientific Research & Development is an India’s leading Open-Access peer reviewed International e-journal for Science, Engineering & Technologies’ Manuscript. Call for original and high quality research paper publish.
Monday, August 24, 2015
Understanding SQL Injection Attack Techniques and Implementation of Various Methods for Attack Detection and Prevention
Shruti Gangan , V.E.S INSTITUTE OF TECHNOLOGY, CHEMBUR;
Tina Gyanchandani, V.E.S INSTITUTE OF TECHNOLOGY, CHEMBUR;
Dhanamma Jagli, V.E.S INSTITUTE OF TECHNOLOGY, CHEMBUR
Security issues of different database driven web applications are continue to be an important and crucial aspect of the ongoing development of the Internet. In the last several decades, Web applications have brought new classes of computer security vulnerabilities, such as AQL injection. SQL Injection Attacks (SQLIAs) is one of the most severe threats to the security of database driven web applications as it compromises integrity and confidentiality of information in database. In this type of attack, an attacker gain control over the database of an application and consequently, he/she may be able to alter data. In this paper we present different types of SQL injection attacks and also implementation of different types of tools which can be used to detect and prevent these attacks.