SQL Injection Attacks, Detection and Prevention
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 6
Abstract
Sql injection is the most dangerous way in which our important and protected data can be hacked. Anybody having a little amount of knowledge can get into the database through web interfaces and can modify or delete the important or protected content of our database. The method or principle is the application takes input from user through any kind of form like for example google forms for winning prizes giving our email and passwords etc. And the malicious users can interpret the vulnerable data which will be interpreted as the sql query instead of the data. This query will take or extract the database details and will allow them to misuse data. Not only modification of database, this will let the hackers to get unauthorized access to any service which is provided like through that form. Injection attack is common of the top 5 web attacks that are executed in the world. Sql injection is a method for exploiting web applications that use client supplied data given through sql queries. Sqli is same as sql where an intruder changes the structure of the query by inserting any sql commands . Our aim is to implement various types of sql injection attacks and through the results we will tell how data can be received by modifying the query. This loss of data can cause a firm to lose a fortune. We will give the example in the below mentioned example.
Authors and Affiliations
Shreyash Shantam, Sudha S
Performance Comparison of Local Route Repair and Source Route Repair In Mobile Ad Hoc Networks
MANETs often experience link breaks as the nodes are mobile. The AODV routing protocol in case of link break, repairs the route by two mechanisms local route repair or source route repair. One or another repair mechanis...
Congestion Control Inventive Approach for Active Queue Management System in Wireless Network
The extensively studied literature in the context of wired networks is the Active Queue Management (AQM) algorithms. In this paper, we have used kalman filter in a inventive way. This paper presents recommendations to t...
A Review Paper on PSO and GA Based Optimization for Vehicle Routing Problem
The vehicle routing problem is basically originated from the truck dispatching problem. The VRP is used to design optimal set of routes to serve a given number of customers with a fleet of vehicles. The VRP plays an imp...
Analysis of Total Phenol, Cellulose and Tannin Content by Using Different Parameters in Ethanol Extract of Pomegranate Peel
Pomegranate (Punicagranatum L.) is considered one of the oldest known edible fruits. Pomegranate peels are characterized by an interior network of membranes comprising almost 26–30%of total fruit weight and are characte...
Methods for Character Identification in Movies: A Review
Now a day’s character Identification from films is a very challenging task due to the huge variation in the appearance of each & every character. It will lead significant research interests and may have many interesting...