Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015
A Survey on SQL Injection Attack Countermeasures Techniques
Aniruddh R. Ladole, D. A. Phalke
As users of internet is increasing day by day. The demands for web services and mobile web application are also increased. The probability of a system being attacked is also increased. All the web applications maintain information at the backend database from which results are retrieved. As these services or web application, can be accessed from anywhere around the world which needs to be always available to all the clients, partners employees, and for different users located at different parts of world. SQL Injection Attack is nowadays one of the topmost threats for web application security as it is the easier than other attacks. Using SQL Injection attackers can steal confidential information. In this paper has reviewed most of the SQL injection attacks detection systems proposed by different authors. This paper can be useful to other researchers for their work who plans to work in security of the database from SQL Injection attacks.
Keywords: SQLIA, Information security, web application vulnerability, cyber security
Edition: Volume 4 Issue 11, November 2015
Pages: 1556 - 1561
How to Cite this Article?
Aniruddh R. Ladole, D. A. Phalke, "A Survey on SQL Injection Attack Countermeasures Techniques", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV151502, Volume 4 Issue 11, November 2015, 1556 - 1561
Similar Articles with Keyword 'SQLIA'
Application for Detecting and Preventing SQL Injection Attacks using Web Service
Anuja A. Patil, Ketaki H. Pangu
An Approach to Detect and Prevent SQL Injection Attacks using Web Service
Shabnam R. Makanadar, Vaibhav V. Solankurkar
Similar Articles with Keyword 'Information security'
Secure and Efficient Item Information Retrieval in Cloud Computing
Dr. Shameem Akther, Tahseen Begum
Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar
Similar Articles with Keyword 'cyber security'
Detection of Malicious URLs using Classification Algorithm
Muskan V. Jaiswal, Dr. Anjali B. Raut
Detecting and Blocking of Malicious URL
Muskan V. Jaiswal, Anjali B. Raut