SQL Injection Attacks, Detection and Prevention

Abstract

Sql injection is the most dangerous way in which our important and protected data can be hacked. Anybody having a little amount of knowledge can get into the database through web interfaces and can modify or delete the important or protected content of our database. The method or principle is the application takes input from user through any kind of form like for example google forms for winning prizes giving our email and passwords etc. And the malicious users can interpret the vulnerable data which will be interpreted as the sql query instead of the data. This query will take or extract the database details and will allow them to misuse data. Not only modification of database, this will let the hackers to get unauthorized access to any service which is provided like through that form. Injection attack is common of the top 5 web attacks that are executed in the world. Sql injection is a method for exploiting web applications that use client supplied data given through sql queries. Sqli is same as sql where an intruder changes the structure of the query by inserting any sql commands . Our aim is to implement various types of sql injection attacks and through the results we will tell how data can be received by modifying the query. This loss of data can cause a firm to lose a fortune. We will give the example in the below mentioned example.

Authors and Affiliations

Shreyash Shantam, Sudha S

Keywords

Related Articles

slugProductivity improvement through six sigma methodology in bearing manufacturing

Purpose of this paper: In the paper is presented a Six Sigma project, undertaken within company for production in BEARINGS, which deals with identification and reduction of production cost & process. Design/methodology...

slugAcoustic Echo Cancellation by Adaptive Combination of Normalized Sub band Adaptive Filters by Using Stochastic Gradient Algorithm

Acoustic echo is a common occurrence in today’s telecommunication systems. It occurs when an audio source and sink operate in full duplex mode; an example of this is a hands-free loudspeaker telephone. In this situation...

slugAnalysis of IP Micro Mobility Protocols: A Review

Node mobility between distinct subnets inside domain or between distinct domains is manged by IP mobility management protocols which are of two types: IP Macro Mobility protocols and IP Micro Mobility protocols. IP Macr...

Study on Ferrocement Panels for Use in Secondary Roofing

In tropical climatic conditions the terrace slab is subjected to direct sunlight and subsequent heat radiation in to the dwelling units. The conventional weathering coarse adopted in the industry to offer thermal insula...

Enhancing the Performance of Natural High Oleic Ester based Mixed Oil Paper with Nano Insulating Liquid for High Voltage Transformer

Nowadays insulation paper for high voltage transformer is based on natural ester due to increase in bio degradability and operating life. Recently oil selection based on unsaturated fatty acid content was proposed and t...

Download PDF file
  • EP ID EP24802
  • DOI -
  • Views 404
  • Downloads 15

How To Cite

Shreyash Shantam, Sudha S (2017). SQL Injection Attacks, Detection and Prevention. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 5(6), -. https://europub.co.uk/articles/-A-24802