SQL Injection Prevention by Adaptive Algorithm

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 1

Abstract

 Abstract: An SQL Injection is one of the most dangerous security issues. SQL injections are dangerous becausethey are a door wide open to hackers to enter your system through your Web interface and to do whatever theyplease - i.e. delete tables, modify databases. The principal behind SQL injection is pretty simple. When anapplication takes user data as an input, there is an opportunity for a malicious user to enter carefully crafteddata that causes the input to be interpreted as part of a SQL query instead of data. Databases are attractivetargets because they typically contain critical application information. SQL injections are a programming errorand they have nothing to do with your web site hosting provider. So, if you have been searching for a secure JSPhosting, PHP hosting or any other type of web hosting packages, you need to know that prevention of an SQLinjection is not a responsibility of your web site hosting provider but of your web developers. In this paper, wehad firstly surveyed different SQL Injection methods and then different techniques against SQL Injection andanalyzed their advantages and disadvantages and proposed a novel and effective solution to avoid attacks on login phase

Authors and Affiliations

Ashish John

Keywords

Related Articles

Automated Packet Classification and Layer Identification of Network Packets a Review

Traffic classification is an automated process which categorizes computer network traffic according to various into a number of traffic classes. In this paper we are comparing different traffic classification methods and...

 Use Map EstimationFor Image Sharpening

 This paper presents a various paradigms for estimating a single latent sharp image given multiple blurry and/or noisy observations. Whether employing it to make an unusable image good, a good image better or givi...

Bandwidth Aware vm Migration Policy in Cloud Data Centers

Abstract: with the advent of Cloud Computing and its tremendous use, Efficient VM migration using task scheduling has become an important issue that affect the performance of Cloud. Designing and implementing .an effecti...

 Trust Modeling Scheme using Cluster Aggregation of Messages for Vehicular Ad hoc Networks

Abstract: A VANET is a decentralized network as every node performs the functions of both host and router. The main benefit of VANET communication is the enhanced passenger safety by virtue of exchanging warning messages...

 A Distant node Based Multicast Routing protocol for Sparse area vehicle to vehicle communication

 Inter-vehicular communication(IVC) is one of the most advanced research areas for last few years. Traditional Mobile-adhoc-network(MANET) protocols are proved to be not that much effective in Vehicularadhoc-netwo...

Download PDF file
  • EP ID EP147909
  • DOI -
  • Views 114
  • Downloads 0

How To Cite

Ashish John (2015).  SQL Injection Prevention by Adaptive Algorithm. IOSR Journals (IOSR Journal of Computer Engineering), 17(1), 19-24. https://europub.co.uk/articles/-A-147909