A Survey on SQL Injection Attack Countermeasures Techniques
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015

A Survey on SQL Injection Attack Countermeasures Techniques

Aniruddh R. Ladole, D. A. Phalke

As users of internet is increasing day by day. The demands for web services and mobile web application are also increased. The probability of a system being attacked is also increased. All the web applications maintain information at the backend database from which results are retrieved. As these services or web application, can be accessed from anywhere around the world which needs to be always available to all the clients, partners employees, and for different users located at different parts of world. SQL Injection Attack is nowadays one of the topmost threats for web application security as it is the easier than other attacks. Using SQL Injection attackers can steal confidential information. In this paper has reviewed most of the SQL injection attacks detection systems proposed by different authors. This paper can be useful to other researchers for their work who plans to work in security of the database from SQL Injection attacks.

Keywords: SQLIA, Information security, web application vulnerability, cyber security

Edition: Volume 4 Issue 11, November 2015

Pages: 1556 - 1561

Share this Article

How to Cite this Article?

Aniruddh R. Ladole, D. A. Phalke, "A Survey on SQL Injection Attack Countermeasures Techniques", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV151502, Volume 4 Issue 11, November 2015, 1556 - 1561

122 PDF Views | 110 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'SQLIA'

Comparative Studies, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 193 - 195

Application for Detecting and Preventing SQL Injection Attacks using Web Service

Anuja A. Patil, Ketaki H. Pangu

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 242 - 245

An Approach to Detect and Prevent SQL Injection Attacks using Web Service

Shabnam R. Makanadar, Vaibhav V. Solankurkar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1556 - 1561

A Survey on SQL Injection Attack Countermeasures Techniques

Aniruddh R. Ladole, D. A. Phalke

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 347 - 351

Web Filtering with SQL Injection

Yogesh Ghuse, Chetan Harshe, Pratibha S. Ghode

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2198 - 2201

Defense against SQL Injection and Cross Site Scripting Vulnerabilities

Kirti Randhe, Vishal Mogal

Share this Article

Similar Articles with Keyword 'Information security'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1028 - 1031

Secure and Efficient Item Information Retrieval in Cloud Computing

Dr. Shameem Akther, Tahseen Begum

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1303 - 1306

Survey on Privacy Preservation of Sensitive Data

Uma Ashok Huljanti, Dr. Srinivas Narasim Kini

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 2039 - 2042

Design and Analysis of Information Security for SIS in Prospective of Application Software

Sharanappa Patil, Ramesh.K

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1053 - 1061

An Efficient Approach in Protection of Information Security via Collaborative Inference Detection

Abilesh. P

Share this Article

Similar Articles with Keyword 'web application vulnerability'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1416 - 1420

Mitigation of CSRF Attack

Nikunj Tandel, Kalpesh Patel

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1556 - 1561

A Survey on SQL Injection Attack Countermeasures Techniques

Aniruddh R. Ladole, D. A. Phalke

Share this Article

Similar Articles with Keyword 'cyber security'

Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021

Pages: 139 - 144

Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic

Senthuran Nallainathan

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1556 - 1561

A Survey on SQL Injection Attack Countermeasures Techniques

Aniruddh R. Ladole, D. A. Phalke

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 320 - 323

Cyber Security - Importance, Effects and Prevention

Shivali Gautam

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 12, December 2016

Pages: 1455 - 1457

Review on Privacy Preserving Deep Computation Model on Cloud for Big Data Feature Learning

Varsha Govindrao Kulkarni, Dr. Kishor Wagh

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 868 - 870

A Network Identification Model on Open Social Network

Amina Beevi S

Share this Article
Top