Study On SQL Injection Attacks: Detection And Prevention
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 7
Abstract
SQL injection also referred to as SQLI in short. It is the most dangerous way in which our data can be hacked. Hackers can get to our databases prudently through Web Interface and can delete, modify the important content of database. The principle behind SQL Injection is very simple, but utter dangerous and powerful. When the application takes input from user through any form etc. the malicious users get opportunity to enter the diligently crafted data which will be interpreted as the SQL query instead of the data. This query will extract the database details and will let the doors wide open for the opportunists to misuse the data. Not only database modification of database, this will let the hackers to get unauthorized access to the application services also. Injection attack is at the first place of the top 10 web attacks that are executed in 2013. SQL injection is a method for exploiting web applications that use client supplied data in SQL queries. SQL Injection refers to the technique of inserting SQL meta characters and commands into Web based input fields in order to manipulate the execution of the backend SQL queries. The occurrence of SQLI is triggered when hacker changes the functioning of query by inserting SQL commands. Our goal is to implement different SQLI attacks and through the results we will see how important data is compromised by changing the query. This loss of data can cause a company to lose in millions. We will try to analyse various attacks in order to get an in depth knowledge of how these attacks work.
Authors and Affiliations
Rishab Garg, Priya Gupta, Rohan Kr Sachdeva
A Review of Content Based Image Retrieval System
content based image retrieval (cbir), also called as query by image content (qbic). It has been an active research field since last decades. In contrast to traditional systems, where images are retrieved on the basis of...
slugAnalysis and Comparison of Various L ossless Compression T echniques
Compression is very much needed in today’s network for efficient transmission and efficient storage of data. In this paper we review and discuss about the image compression, need of compression, its principles,...
Visualizing Website Clickstream Data with Apache Hadoop using Hortonworks
Nowadays most of the organizations have turned to Ecommerce which has become a necessary component for business strategy and a catalyst for economic development. These organizations need to predict the analysis about th...
Silicon Wafer Technologies: Past & Future
Silicon is now best substrate material for IC technologies. This paper is review about development of wafer technologies in past and future. Also discuss about silicon crystal growth, Silicon on Insulator technologies a...
Earlier Detection of Glaucoma using Empirical Wavelet Transform
Glaucoma is an ocular disorder caused due to increased fluid pressure in the optic nerve. It damages the optic nerve subsequently causes loss of vision. The available scanning methods are Heidelberg Retinal Tomography (...