A Real-World Implementation of SQL Injection Attack Using Open Source Tools for Enhanced Cybersecurity Learning
Title | A Real-World Implementation of SQL Injection Attack Using Open Source Tools for Enhanced Cybersecurity Learning |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Vyamajala, S., Mohd, T. K., Javaid, A. |
Conference Name | 2018 IEEE International Conference on Electro/Information Technology (EIT) |
Date Published | may |
Keywords | actual website, Acunetix, Computer hacking, computer science education, Crawlers, Databases, enhanced cybersecurity learning, executing SQL queries, foundational cybersecurity course, Human Behavior, invasive software, Linux, Metrics, open source tools, policy-based-governance, preventive measures, privacy, pubcrawl, query processing, real-world implementation, Resiliency, retrieving sensitive information, Servers, specific website, SQL, SQL Injection, SQL injection attack, threats, Tools, vulnerabilities, Web sites, website connected database |
Abstract | SQL injection is well known a method of executing SQL queries and retrieving sensitive information from a website connected database. This process poses a threat to those applications which are poorly coded in the today's world. SQL is considered as one of the top 10 vulnerabilities even in 2018. To keep a track of the vulnerabilities that each of the websites are facing, we employ a tool called Acunetix which allows us to find the vulnerabilities of a specific website. This tool also suggests measures on how to ensure preventive measures. Using this implementation, we discover vulnerabilities in an actual website. Such a real-world implementation would be useful for instructional use in a foundational cybersecurity course. |
URL | https://ieeexplore.ieee.org/document/8500136 |
DOI | 10.1109/EIT.2018.8500136 |
Citation Key | vyamajala_real-world_2018 |
- privacy
- website connected database
- Web sites
- vulnerabilities
- tools
- threats
- SQL injection attack
- SQL injection
- SQL
- specific website
- Servers
- retrieving sensitive information
- Resiliency
- real-world implementation
- query processing
- pubcrawl
- actual website
- preventive measures
- policy-based-governance
- open source tools
- Metrics
- Linux
- invasive software
- Human behavior
- foundational cybersecurity course
- executing SQL queries
- enhanced cybersecurity learning
- Databases
- Crawlers
- computer science education
- Computer hacking
- Acunetix