International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Double Blind Reviewed

ISSN: 2319-7064


Downloads: 106

Comparative Studies | Computer Science & Engineering | India | Volume 2 Issue 4, April 2013


Application for Detecting and Preventing SQL Injection Attacks using Web Service

Anuja A. Patil | Ketaki H. Pangu


Abstract: Every cyber attack mostly targets the Databases through the firewalls that shield it. Like that SQL injection attacks can target the databases. This type of attacks occurs due to poor input validation code, poor website administration as well as it takes advantage of less security to the databases. In this case the attacker can take advantage of web services applications and can pass a series of unwanted, malicious SQL statements as input and try to execute the back end of the system. So, the proposed model gives methodology to detect and prevent the SQLIAs in databases using XPATH validation systems which is most efficient way.


Keywords: Database security, web application security, SQL injection attacks, Web Service


Edition: Volume 2 Issue 4, April 2013,


Pages: 193 - 195


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Anuja A. Patil, Ketaki H. Pangu, "Application for Detecting and Preventing SQL Injection Attacks using Web Service", International Journal of Science and Research (IJSR), Volume 2 Issue 4, April 2013, pp. 193-195, https://www.ijsr.net/get_abstract.php?paper_id=IJSRON2013748

Similar Articles with Keyword 'Database security'

Downloads: 108

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 242 - 245

An Approach to Detect and Prevent SQL Injection Attacks using Web Service

Shabnam R. Makanadar | Vaibhav V. Solankurkar

Share this Article

Downloads: 109

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2062 - 2066

XOR- Based Secrete Sharing Scheme For Image Database Security: A Review

Bhagyashree A. Dhamande | Rutuja N. Kamble

Share this Article
Top