SQL Injection Attacks, Detection and Prevention

Abstract

Sql injection is the most dangerous way in which our important and protected data can be hacked. Anybody having a little amount of knowledge can get into the database through web interfaces and can modify or delete the important or protected content of our database. The method or principle is the application takes input from user through any kind of form like for example google forms for winning prizes giving our email and passwords etc. And the malicious users can interpret the vulnerable data which will be interpreted as the sql query instead of the data. This query will take or extract the database details and will allow them to misuse data. Not only modification of database, this will let the hackers to get unauthorized access to any service which is provided like through that form. Injection attack is common of the top 5 web attacks that are executed in the world. Sql injection is a method for exploiting web applications that use client supplied data given through sql queries. Sqli is same as sql where an intruder changes the structure of the query by inserting any sql commands . Our aim is to implement various types of sql injection attacks and through the results we will tell how data can be received by modifying the query. This loss of data can cause a firm to lose a fortune. We will give the example in the below mentioned example.

Authors and Affiliations

Shreyash Shantam, Sudha S

Keywords

Related Articles

Study of Accuracy in Incremental Sheet Forming Of Aluminium

The Incremental Sheet Forming process is quickly developed as it is capable of delivering custom made parts or batch products economically as per the market needs. In this process the tool imparts local plastic deformat...

CRA Role in Identity-Based Encryption for Its Applications

Identicalness based Cryptography is an id based cryptography which depends on the user identity, (IBE) is a world Key cryptoorganisation and eliminates the need of public paint infrastructure (PKI) and certicate adminis...

Thermal Imaging for Facial Expression– Fatigue Detection

Facial expressions play significant roles in our daily communication. Recognizing these expressions has extensive applications, such as human-computer interface, multimedia, and security. However, as the basis of expres...

LTE Scheduling Algorithm with Balanced Throughput and Fairness

Long Term Evolution, the recent technology in Mobile Communication can handle the high Data Rate traffic in a better way. Packet scheduling plays a vital role in handling the data traffic by allocating resources in freq...

slugPreparing for tomorrows challenges today, with automation in hospitals

In this paper we are introducing a new technique called IVR (Interactive Voice Response) for automation of hospital with decision making ability. Now a days we are using traditional communic...

Download PDF file
  • EP ID EP24802
  • DOI -
  • Views 447
  • Downloads 15

How To Cite

Shreyash Shantam, Sudha S (2017). SQL Injection Attacks, Detection and Prevention. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 5(6), -. https://europub.co.uk/articles/-A-24802