Web Filtering with SQL Injection

Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 4

Abstract

As more businesses and organizations provide online services, the number of web sites or applications which are linked to a database has increased greatly. Often the data held in such databases is confidential or private – and possibly of great interest to a hacker, disgruntled employee, or criminal group. While the database and the server holding it may have been secured, the design of the web interface is often overlooked and could allow unauthorized users access to the database. SQL injection, the use of database commands in the SQL language where user input is expected, remains a top threat. It was the 3rd listed error in the January 2009 “CWE/SANS Top 25 Most Dangerous Programming Errors”[a] and has been the mechanism for a number of prevalent attacks. For example, through most of 2008 there were ongoing, indiscriminate and widespread attacks on vulnerable web sites, which added a link to a malicious file (usually JavaScript) that most web site visitors would unintentionally run on loading the page. This then caused the visitor’s computer to be infected with malware. Even well-known and widely trusted web sites were affected by this problem. This document will illustrate some of the main techniques used in SQL injection, then describe methods that can reduce the effectiveness of such attacks. In addition to usual standard IT best practice, such as logging and regular and prompt patching, the majority of SQL injection vulnerabilities can be moderated through careful and robust programming. It is hoped that the information provided here will highlight the seriousness of leaving this type of flaw unaddressed and promote the improved design of database-linked Internet resources.

Authors and Affiliations

Keywords

Related Articles

Advance Reservation Policy for Inter-Member Workflow Scheduling in Community Cloud

The problem of solving fast collaboration among many related enterprises has been an important research issue in the Web Society research area. The recent proposed Cloud Computing application model called the Community C...

Load Balancing By Max-Min Algorithm in Private Cloud Environment

Cloud computing is a latest emerging technology because of its high availability, high performance, low cost and pay for use model. wherein IT infrastructure and applications are provided as services to end-users. It en...

Ultrasound Imaging in the Diagnosis and Assessment of Testicular Disease

Ultrasound Imaging in the Diagnosis and Assessment of Testicular Disease

Dental Fluorosis Prevalence among Children in Endemic Fluoride Areas of Chittoor District

Flourosis is the result of fluoride rearranging the crystalline structure of a tooth's enamel as it is still growing. It is evidence of fluoride's potency and ability to cause physiologic changes within the body and rais...

On Farm Evaluation of Yield and Quality of Multicut Sorghum (Sorghum bicolor) Fodder Through Application of Phosphorus

Abstract: This investigation was carried out in kharif 2013-14 with five levels of phosphorus fertilizer viz. 0 (T1), 40 (T2), 80 (T3), 120 (T4) and 160 (T5) kg P2O5 ha-1 in the fields of 30 numbers of farmers. Significa...

Download PDF file
  • EP ID EP363780
  • DOI -
  • Views 102
  • Downloads 0

How To Cite

(2015). Web Filtering with SQL Injection. International Journal of Science and Research (IJSR), 4(4), -. https://europub.co.uk/articles/-A-363780