Abstract

Structured Query Language Injection Attack (SQLIA) is the most exposed to attack on the Internet. From this attack, the attacker can take control of the database therefore be able to interpolate the data from the database server for the website. Hence, the big challenge became to secure such website against attack via the Internet. We have presented different types of attack methods and prevention techniques of SQLIA which were used to aid the design and implementation of our model. In the paper, work is separated into two parts. The first aims to put SQLIA into perspective by outlining some of the materials and researches that have already been completed. The section suggesting methods of mitigating SQLIA aims to clarify some misconceptions about SQLIA prevention and provides some useful tips to software developers and database administrators. The second details the creation of a filtering proxy server used to prevent a SQL injection attack and analyses the performance impact of the filtering process on web application.

Highlights

  • With the development of World Wide Web the organizations are beginning to get more sophisticated about how they employ their website

  • Structured Query Language Injection Attack (SQLIA) are easy to learn and exploitable, so this method of attack is used by attackers

  • SQLIA occurs when an attacker causes the web application to generate SQL queries that are functionally different from what the user interface programmer intended

Read more

Summary

Introduction

With the development of World Wide Web the organizations are beginning to get more sophisticated about how they employ their website. (SQLIA) are one of the top threats for web application security, and SQL injections are one of the most serious vulnerability types. SQL injection is a way to attack a database through a firewall by taking advantage of non-validated SQL vulnerabilities. It is a method by which the parameters of a Web based application are modified in order to change the SQL statements that are passed to a backend database. An attacker is able to insert a series of SQL statements into a query by manipulating the data input, for example, by adding a single quote (') to the parameters. To gain access to an organization’s host computers via the machine hosting the database can be done using package procedures and 3GL language extensions that allow O/S access [4]

Background
Related Work and Observations of SQLIA
Current Situations
Existing Products
Design Considerations
Implementation Decisions
SQL Signature Filtering
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call