Research Paper | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014
Defense against SQL Injection and Cross Site Scripting Vulnerabilities
Kirti Randhe, Vishal Mogal
As dependence on web applications is increasing very rapidly in various fields like social networks, online services, banking, etc. Access to web applications and ease of use make them more popular in offering online services instead of in person services. Due to the presence of security weakness in web applications malicious user can easily exploit various security vulnerabilities and become reason of their failure.SQL injection attacks and cross site scripting attacks are the two most common attacks in web application. Attack prevention techniques protect the applications from attack during their execution in actual environment.Prevention and detection of intrusion is made through a deployment of reverse proxy with the intrusion and prevention mechanism which are built in against web attacks specially SQLIA. In reverse proxy user input is sanitized which may transform into a database attack. Here data cleaning algorithm is used for sanitization application. Using this method SQL injection attack as well as cross site scripting attacks are detected.
Keywords: SQL attacks, SQL injection, Cross site scripting, Sanitization, Vulnerabilities
Edition: Volume 3 Issue 11, November 2014
Pages: 2198 - 2201
How to Cite this Article?
Kirti Randhe, Vishal Mogal, "Defense against SQL Injection and Cross Site Scripting Vulnerabilities", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=OCT141523, Volume 3 Issue 11, November 2014, 2198 - 2201
98 PDF Views | 91 PDF Downloads
Similar Articles with Keyword 'SQL injection'
Comparative Studies, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013
Pages: 193 - 195Application for Detecting and Preventing SQL Injection Attacks using Web Service
Anuja A. Patil, Ketaki H. Pangu
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013
Pages: 242 - 245An Approach to Detect and Prevent SQL Injection Attacks using Web Service
Shabnam R. Makanadar, Vaibhav V. Solankurkar
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1556 - 1561A Survey on SQL Injection Attack Countermeasures Techniques
Aniruddh R. Ladole, D. A. Phalke
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 347 - 351Web Filtering with SQL Injection
Yogesh Ghuse, Chetan Harshe, Pratibha S. Ghode
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 760 - 762Attacks in HTML5
Kailash L. Methawani, Prof. Avinash P. Wadhe
Similar Articles with Keyword 'Cross site scripting'
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 637 - 642Solving False Positive Problem in Client Side XSS Filter
Dr. Nitin Mishra, Saumya Chaturvedi, Chandrashekhar Dewangan, Sakshi Jain
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 14 - 18Client Side Filter Enhancement using Web Proxy
Santosh Kumar Singh, Rahul Shrivastava
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2198 - 2201Defense against SQL Injection and Cross Site Scripting Vulnerabilities
Kirti Randhe, Vishal Mogal
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 4, April 2017
Pages: 2410 - 2414A Novel Approach to Provide Security for Cloud Data
K. Anbazhagan, R. Sugumar
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 414 - 418Prevention to Cross-site Scripting Attacks: A Survey
Manisha S Mahindrakar
Similar Articles with Keyword 'Sanitization'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2198 - 2201Defense against SQL Injection and Cross Site Scripting Vulnerabilities
Kirti Randhe, Vishal Mogal
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 265 - 268Providing Security in Social Network with Privacy Preservation
Aswathy Rajeev K, Sunder R
Similar Articles with Keyword 'Vulnerabilities'
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1069 - 1073Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 842 - 845Defending Against Source Routing Attacks in Wireless Ad-Hoc Networks
Srihari Babu Kolla, B. B. K. Prasad
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1200 - 1203Efficient Hardware Encryption Using Lightweight Process
Deeksha Bhardwaj, Rohit Pawar, Aman Jain
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1295 - 1299A Review on Security Attacks in Mobile Ad-hoc Networks
Amandeep Kaur, Dr. Amardeep Singh
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2025 - 2029Investigation of Security in Cloud Computing
Annu Devi