A Survey on SQL Injection Attack Countermeasures Techniques
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015

A Survey on SQL Injection Attack Countermeasures Techniques

Aniruddh R. Ladole, D. A. Phalke

As users of internet is increasing day by day. The demands for web services and mobile web application are also increased. The probability of a system being attacked is also increased. All the web applications maintain information at the backend database from which results are retrieved. As these services or web application, can be accessed from anywhere around the world which needs to be always available to all the clients, partners employees, and for different users located at different parts of world. SQL Injection Attack is nowadays one of the topmost threats for web application security as it is the easier than other attacks. Using SQL Injection attackers can steal confidential information. In this paper has reviewed most of the SQL injection attacks detection systems proposed by different authors. This paper can be useful to other researchers for their work who plans to work in security of the database from SQL Injection attacks.

Keywords: SQLIA, Information security, web application vulnerability, cyber security

Edition: Volume 4 Issue 11, November 2015

Pages: 1556 - 1561

Share this Article

How to Cite this Article?

Aniruddh R. Ladole, D. A. Phalke, "A Survey on SQL Injection Attack Countermeasures Techniques", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV151502, Volume 4 Issue 11, November 2015, 1556 - 1561

68 PDF Views | 64 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'SQLIA'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2198 - 2201

Defense against SQL Injection and Cross Site Scripting Vulnerabilities

Kirti Randhe, Vishal Mogal

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1556 - 1561

A Survey on SQL Injection Attack Countermeasures Techniques

Aniruddh R. Ladole, D. A. Phalke

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 60 - 62

A Survey on Detection and Prevention of SQL Injection Attack

S. M. Chaware, Sujata S. Wakchaure

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 347 - 351

Web Filtering with SQL Injection

Yogesh Ghuse, Chetan Harshe, Pratibha S. Ghode

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 613 - 616

A Study on Disclosure and Avoidance of SQL Injection Attack

Monali Rajurkar, S. A. Mane

Share this Article

Similar Articles with Keyword 'Information security'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1028 - 1031

Secure and Efficient Item Information Retrieval in Cloud Computing

Dr. Shameem Akther, Tahseen Begum

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1303 - 1306

Survey on Privacy Preservation of Sensitive Data

Uma Ashok Huljanti, Dr. Srinivas Narasim Kini

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1053 - 1061

An Efficient Approach in Protection of Information Security via Collaborative Inference Detection

Abilesh. P

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2619 - 2622

Information Security in Multi-Cloud Environment

Digambar D. Patil, Megha Singh

Share this Article

Similar Articles with Keyword 'web application vulnerability'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1416 - 1420

Mitigation of CSRF Attack

Nikunj Tandel, Kalpesh Patel

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1556 - 1561

A Survey on SQL Injection Attack Countermeasures Techniques

Aniruddh R. Ladole, D. A. Phalke

Share this Article

Similar Articles with Keyword 'cyber security'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1556 - 1561

A Survey on SQL Injection Attack Countermeasures Techniques

Aniruddh R. Ladole, D. A. Phalke

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 320 - 323

Cyber Security - Importance, Effects and Prevention

Shivali Gautam

Share this Article

Informative Article, Computer Science & Engineering, India, Volume 8 Issue 11, November 2019

Pages: 1963 - 1965

Cyber Security by Hack-Space Integrated Model

S. Riyazbanu, B. Gouri

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 778 - 780

Challenges with Big Data Analytics

Saumya Salian

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 922 - 925

The Influence of Classical Information on Crypto Analysis

Sohil R Shah

Share this Article
Top