Visible to the public Diverse Approaches Have Been Presented To Mitigate SQL Injection Attack, But It Is Still Alive: A Review

TitleDiverse Approaches Have Been Presented To Mitigate SQL Injection Attack, But It Is Still Alive: A Review
Publication TypeConference Paper
Year of Publication2022
AuthorsQbea'h, Mohammad, Alrabaee, Saed, Alshraideh, Mohammad, Sabri, Khair Eddin
Conference Name2022 International Conference on Computer and Applications (ICCA)
Keywordsapplication security, command injection attacks, Companies, composability, cybersecurity, Data security, Government, machine learning, malicious code, Market research, Metrics, mobile security, pubcrawl, resilience, Resiliency, review, SQL Injection, SQL injection attack, SQLIA, Structured Query Language, Vulnerability, web security
AbstractA huge amount of stored and transferred data is expanding rapidly. Therefore, managing and securing the big volume of diverse applications should have a high priority. However, Structured Query Language Injection Attack (SQLIA) is one of the most common dangerous threats in the world. Therefore, a large number of approaches and models have been presented to mitigate, detect or prevent SQL injection attack but it is still alive. Most of old and current models are created based on static, dynamic, hybrid or machine learning techniques. However, SQL injection attack still represents the highest risk in the trend of web application security risks based on several recent studies in 2021. In this paper, we present a review of the latest research dealing with SQL injection attack and its types, and demonstrating several types of most recent and current techniques, models and approaches which are used in mitigating, detecting or preventing this type of dangerous attack. Then, we explain the weaknesses and highlight the critical points missing in these techniques. As a result, we still need more efforts to make a real, novel and comprehensive solution to be able to cover all kinds of malicious SQL commands. At the end, we provide significant guidelines to follow in order to mitigate such kind of attack, and we strongly believe that these tips will help developers, decision makers, researchers and even governments to innovate solutions in the future research to stop SQLIA.
DOI10.1109/ICCA56443.2022.10039611
Citation Keyqbeah_diverse_2022