Detection of SQL injection attacks by removing the parameter values of SQL query
Title | Detection of SQL injection attacks by removing the parameter values of SQL query |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Katole, R. A., Sherekar, S. S., Thakare, V. M. |
Conference Name | 2018 2nd International Conference on Inventive Systems and Control (ICISC) |
Keywords | backend database, Computer crime, Conferences, confidential information, database, Databases, desktop web application, Human Behavior, Internet, Internet users, Metrics, mobile computing, mobile web applications, parameter values, policy-based-governance, privacy, pubcrawl, query processing, Resiliency, Runtime, SQL, SQL Injection, SQL injection attack detection method, SQL injection attackers, SQL Injection attacks, SQL query, Structured Query Language, Tools, Web applications, web services |
Abstract | Internet users are increasing day by day. The web services and mobile web applications or desktop web application's demands are also increasing. The chances of a system being hacked are also increasing. All web applications maintain data at the backend database from which results are retrieved. As web applications can be accessed from anywhere all around the world which must be available to all the users of the web application. SQL injection attack is nowadays one of the topmost threats for security of web applications. By using SQL injection attackers can steal confidential information. In this paper, the SQL injection attack detection method by removing the parameter values of the SQL query is discussed and results are presented. |
URL | https://ieeexplore.ieee.org/document/8398896 |
DOI | 10.1109/ICISC.2018.8398896 |
Citation Key | katole_detection_2018 |
- privacy
- web services
- web applications
- tools
- Structured Query Language
- SQL query
- SQL Injection attacks
- SQL injection attackers
- SQL injection attack detection method
- SQL injection
- SQL
- Runtime
- Resiliency
- query processing
- pubcrawl
- backend database
- policy-based-governance
- parameter values
- mobile web applications
- mobile computing
- Metrics
- Internet users
- internet
- Human behavior
- desktop web application
- Databases
- database
- confidential information
- Conferences
- Computer crime