International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 106

Comparative Studies | Computer Science & Engineering | India | Volume 2 Issue 4, April 2013


Application for Detecting and Preventing SQL Injection Attacks using Web Service

Anuja A. Patil, Ketaki H. Pangu


Abstract: Every cyber attack mostly targets the Databases through the firewalls that shield it. Like that SQL injection attacks can target the databases. This type of attacks occurs due to poor input validation code, poor website administration as well as it takes advantage of less security to the databases. In this case the attacker can take advantage of web services applications and can pass a series of unwanted, malicious SQL statements as input and try to execute the back end of the system. So, the proposed model gives methodology to detect and prevent the SQLIAs in databases using XPATH validation systems which is most efficient way.


Keywords: Database security, web application security, SQL injection attacks, Web Service


Edition: Volume 2 Issue 4, April 2013,


Pages: 193 - 195


How to Cite this Article?

Anuja A. Patil, Ketaki H. Pangu, "Application for Detecting and Preventing SQL Injection Attacks using Web Service", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=IJSRON2013748, Volume 2 Issue 4, April 2013, 193 - 195

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Database security'

Downloads: 108

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 242 - 245

An Approach to Detect and Prevent SQL Injection Attacks using Web Service

Shabnam R. Makanadar, Vaibhav V. Solankurkar

Share this Article

Downloads: 109

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2062 - 2066

XOR- Based Secrete Sharing Scheme For Image Database Security: A Review

Bhagyashree A. Dhamande, Rutuja N. Kamble

Share this Article

Similar Articles with Keyword 'web application security'

Downloads: 108

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 242 - 245

An Approach to Detect and Prevent SQL Injection Attacks using Web Service

Shabnam R. Makanadar, Vaibhav V. Solankurkar

Share this Article

Downloads: 114

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1556 - 1561

A Survey on SQL Injection Attack Countermeasures Techniques

Aniruddh R. Ladole, D. A. Phalke

Share this Article

Similar Articles with Keyword 'SQL injection attacks'

Downloads: 108

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 242 - 245

An Approach to Detect and Prevent SQL Injection Attacks using Web Service

Shabnam R. Makanadar, Vaibhav V. Solankurkar

Share this Article

Downloads: 114

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1556 - 1561

A Survey on SQL Injection Attack Countermeasures Techniques

Aniruddh R. Ladole, D. A. Phalke

Share this Article

Similar Articles with Keyword 'Web Service'

Downloads: 103

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1628 - 1631

A Survey On XML-Injection Attack Detection Systems

Swati Ramesh Kesharwani, Aarti Deshpande

Share this Article

Downloads: 103

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1886 - 1890

A Flexible and Dynamic Failure Recovery Mechanism for Composite Web Services Using Subset Replacement

Shuchi Gupta, Prof. Praveen Bhanodia

Share this Article

Similar Articles with Keyword 'Database'

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 886 - 889

Survey on Algorithms Predicting Performance of Keyword Queries

Snehal Borole

Share this Article

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 716 - 720

A Comprehensive Study of Elasticsearch

Nikita Kathare, O. Vinati Reddy, Dr. Vishalakshi Prabhu

Share this Article

Similar Articles with Keyword 'security'

Downloads: 117 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 134

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Similar Articles with Keyword 'web'

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1717 - 1724

Krashi Prabhandak (Agricultural Manager)

Prafful Mundra, A V Pavan Krishna, Swarnalatha P, Venkata Sumanth Kakollu

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1240 - 1249

Secure Methods for Supplychain Management to Protect from Attacks in Blockchain

B. Ratnakanth, K. Venkata Ramana

Share this Article

Similar Articles with Keyword 'application'

Downloads: 176 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, Bangladesh, Volume 5 Issue 6, June 2016

Pages: 1523 - 1527

Multifunctional Remote Controlled Robot Using Android Application

T. A. Mithu, T. S. Reddy

Share this Article

Downloads: 155

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Similar Articles with Keyword 'SQL'

Downloads: 103

Review Papers, Computer Science & Engineering, India, Volume 7 Issue 5, May 2018

Pages: 1579 - 1580

A Review of Incremental Data Load on Premises to Azure

Tejaswee Poya, Rahul Mishra

Share this Article

Downloads: 105

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2041 - 2044

Optimization Technique for Efficient Dynamic Query Forms with NoSQL

Kavita Ozarkar, Rakesh Rajani

Share this Article

Similar Articles with Keyword 'injection'

Downloads: 102

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 842 - 845

Defending Against Source Routing Attacks in Wireless Ad-Hoc Networks

Srihari Babu Kolla, B. B. K. Prasad

Share this Article

Downloads: 103

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1628 - 1631

A Survey On XML-Injection Attack Detection Systems

Swati Ramesh Kesharwani, Aarti Deshpande

Share this Article

Similar Articles with Keyword 'attacks'

Downloads: 134

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 2

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Similar Articles with Keyword 'Web'

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1717 - 1724

Krashi Prabhandak (Agricultural Manager)

Prafful Mundra, A V Pavan Krishna, Swarnalatha P, Venkata Sumanth Kakollu

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1240 - 1249

Secure Methods for Supplychain Management to Protect from Attacks in Blockchain

B. Ratnakanth, K. Venkata Ramana

Share this Article

Similar Articles with Keyword 'Service'

Downloads: 1

Research Proposals or Synopsis, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 705 - 706

An Analysis on Voice Assistant

Shravankumar Jha

Share this Article

Downloads: 2

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article
Top