Defense against SQL Injection and Cross Site Scripting Vulnerabilities
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014

Defense against SQL Injection and Cross Site Scripting Vulnerabilities

Kirti Randhe, Vishal Mogal

As dependence on web applications is increasing very rapidly in various fields like social networks, online services, banking, etc. Access to web applications and ease of use make them more popular in offering online services instead of in person services. Due to the presence of security weakness in web applications malicious user can easily exploit various security vulnerabilities and become reason of their failure.SQL injection attacks and cross site scripting attacks are the two most common attacks in web application. Attack prevention techniques protect the applications from attack during their execution in actual environment.Prevention and detection of intrusion is made through a deployment of reverse proxy with the intrusion and prevention mechanism which are built in against web attacks specially SQLIA. In reverse proxy user input is sanitized which may transform into a database attack. Here data cleaning algorithm is used for sanitization application. Using this method SQL injection attack as well as cross site scripting attacks are detected.

Keywords: SQL attacks, SQL injection, Cross site scripting, Sanitization, Vulnerabilities

Edition: Volume 3 Issue 11, November 2014

Pages: 2198 - 2201

Share this Article

How to Cite this Article?

Kirti Randhe, Vishal Mogal, "Defense against SQL Injection and Cross Site Scripting Vulnerabilities", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=OCT141523, Volume 3 Issue 11, November 2014, 2198 - 2201

98 PDF Views | 91 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'SQL injection'

Comparative Studies, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 193 - 195

Application for Detecting and Preventing SQL Injection Attacks using Web Service

Anuja A. Patil, Ketaki H. Pangu

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 242 - 245

An Approach to Detect and Prevent SQL Injection Attacks using Web Service

Shabnam R. Makanadar, Vaibhav V. Solankurkar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1556 - 1561

A Survey on SQL Injection Attack Countermeasures Techniques

Aniruddh R. Ladole, D. A. Phalke

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 347 - 351

Web Filtering with SQL Injection

Yogesh Ghuse, Chetan Harshe, Pratibha S. Ghode

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 760 - 762

Attacks in HTML5

Kailash L. Methawani, Prof. Avinash P. Wadhe

Share this Article

Similar Articles with Keyword 'Cross site scripting'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 637 - 642

Solving False Positive Problem in Client Side XSS Filter

Dr. Nitin Mishra, Saumya Chaturvedi, Chandrashekhar Dewangan, Sakshi Jain

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 14 - 18

Client Side Filter Enhancement using Web Proxy

Santosh Kumar Singh, Rahul Shrivastava

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2198 - 2201

Defense against SQL Injection and Cross Site Scripting Vulnerabilities

Kirti Randhe, Vishal Mogal

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 4, April 2017

Pages: 2410 - 2414

A Novel Approach to Provide Security for Cloud Data

K. Anbazhagan, R. Sugumar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 414 - 418

Prevention to Cross-site Scripting Attacks: A Survey

Manisha S Mahindrakar

Share this Article

Similar Articles with Keyword 'Sanitization'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2198 - 2201

Defense against SQL Injection and Cross Site Scripting Vulnerabilities

Kirti Randhe, Vishal Mogal

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 265 - 268

Providing Security in Social Network with Privacy Preservation

Aswathy Rajeev K, Sunder R

Share this Article

Similar Articles with Keyword 'Vulnerabilities'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 842 - 845

Defending Against Source Routing Attacks in Wireless Ad-Hoc Networks

Srihari Babu Kolla, B. B. K. Prasad

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1200 - 1203

Efficient Hardware Encryption Using Lightweight Process

Deeksha Bhardwaj, Rohit Pawar, Aman Jain

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1295 - 1299

A Review on Security Attacks in Mobile Ad-hoc Networks

Amandeep Kaur, Dr. Amardeep Singh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2025 - 2029

Investigation of Security in Cloud Computing

Annu Devi

Share this Article
Top