Abstract

As the SQL injection attack is still at the top of the list at Open Web Application Security Project (OWASP) for more than one decade, this type of attack created too many types of issues for a web application, sensors, or any similar type of applications, such as leakage of user private data and organization intellectual property, or may cause Distributed Denial of Service (DDoS) attacks. This paper focused on the poor coding or invalidated input field which is a big cause of services unavailability for web applications. Secondly, it focused on the selection of program created issues for the WebSocket connections between sensors and the webserver. The number of users is growing to use web applications and mobile apps. These web applications or mobile apps are used for different purposes such as tracking vehicles, banking services, online stores for shopping, taxi booking, logistics, education, monitoring user activities, collecting data, or sending any instructions to sensors, and social websites. Web applications are easy to develop with less time and at a low cost. Due to that, business community or individual service provider’s first choice is to have a website and mobile app. So everyone is trying to provide 24/7 services to its users without any downtime. But there are some critical issues of web application design and development. These problems are leading to too many security loopholes for web servers, web applications, and its user’s privacy. Because of poor coding and validation of input fields, these web applications are vulnerable to SQL Injection and other security problems. Instead of using the latest third-party frameworks, language for website development, and version database server, another factor to disturb the services of a web server may be the socket programming for sensors at the production level. These sensors are installed in vehicles to track or use them for booking mobile apps.

Highlights

  • With the growing number of mobile app users, everyone is trying to develop their business apps as soon as possible

  • All of the above Structured Query Language (SQL) injection attacks are more dangerous for the web application or for other devices which are using it as web services. is attack is at the top of all Security and Communication Networks injection-type family attacks or web application attacks

  • It is performed by inserting the SQL query command into the input or the query will be appended with the targeted Uniform Resource Locator (URL). ese SQL queries are transformed into SQL code which is inserted by an attacker [1, 2]. is injection vulnerability is the main point of web application security exploitation by an attacker

Read more

Summary

Introduction

With the growing number of mobile app users, everyone is trying to develop their business apps as soon as possible. Is attack is at the top of all Security and Communication Networks injection-type family attacks or web application attacks. All of the above Structured Query Language (SQL) injection attacks are more dangerous for the web application or for other devices (like mobile apps or sensors) which are using it as web services. In this attack, the weakness of input fields is exploited by the attackers. Is injection vulnerability is the main point of web application security exploitation by an attacker It is performed by inserting the SQL query command into the input or the query will be appended with the targeted Uniform Resource Locator (URL). ese SQL queries are transformed into SQL code which is inserted by an attacker [1, 2]. is injection vulnerability is the main point of web application security exploitation by an attacker

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call