An Emulation of Sql Injection Disclosure and Deterrence
Title | An Emulation of Sql Injection Disclosure and Deterrence |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Lekshmi, A. S. Sai, Devipriya, V. S. |
Conference Name | 2017 International Conference on Networks Advances in Computational Technologies (NetACT) |
Date Published | July 2017 |
Publisher | IEEE |
ISBN Number | 978-1-5090-6590-5 |
Keywords | authentication, authorisation, Companies, data retrieval, Databases, Heisenberg analysis, Honey Pot, Honey pot mechanism, honey pots, human factors, information retrieval, Internet, message authentication, password, password security, pubcrawl, resilience, Resiliency, Scalability, security vulnerability, SQL, SQL Injection, SQL injection deterrence, SQL injection disclosure, Web applications, Web applications authentication, Web applications authorization |
Abstract | SQL Injection is one of the most critical security vulnerability in web applications. Most web applications use SQL as web applications. SQL injection mainly affects these websites and web applications. An attacker can easily bypass a web applications authentication and authorization and get access to the contents they want by SQL injection. This unauthorised access helps the attacker to retrieve confidential data's, trade secrets and can even delete or modify valuable documents. Even though, to an extend many preventive measures are found, till now there are no complete solution for this problem. Hence, from the surveys and analyses done, an enhanced methodology is proposed against SQL injection disclosure and deterrence by ensuring proper authentication using Heisenberg analysis and password security using Honey pot mechanism. |
URL | https://ieeexplore.ieee.org/document/8076787 |
DOI | 10.1109/NETACT.2017.8076787 |
Citation Key | lekshmi_emulation_2017 |
- password
- Web applications authorization
- Web applications authentication
- web applications
- SQL injection disclosure
- SQL injection deterrence
- SQL injection
- SQL
- security vulnerability
- Scalability
- Resiliency
- resilience
- pubcrawl
- password security
- authentication
- message authentication
- internet
- information retrieval
- Human Factors
- honey pots
- Honey pot mechanism
- Honey Pot
- Heisenberg analysis
- Databases
- data retrieval
- Companies
- authorisation