International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 115 | Views: 277 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015 | Popularity: 7 / 10


     

A Survey on SQL Injection Attack Countermeasures Techniques

Aniruddh R. Ladole, D. A. Phalke


Abstract: As users of internet is increasing day by day. The demands for web services and mobile web application are also increased. The probability of a system being attacked is also increased. All the web applications maintain information at the backend database from which results are retrieved. As these services or web application, can be accessed from anywhere around the world which needs to be always available to all the clients, partners employees, and for different users located at different parts of world. SQL Injection Attack is nowadays one of the topmost threats for web application security as it is the easier than other attacks. Using SQL Injection attackers can steal confidential information. In this paper has reviewed most of the SQL injection attacks detection systems proposed by different authors. This paper can be useful to other researchers for their work who plans to work in security of the database from SQL Injection attacks.


Keywords: SQLIA, Information security, web application vulnerability, cyber security


Edition: Volume 4 Issue 11, November 2015


Pages: 1556 - 1561



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Aniruddh R. Ladole, D. A. Phalke, "A Survey on SQL Injection Attack Countermeasures Techniques", International Journal of Science and Research (IJSR), Volume 4 Issue 11, November 2015, pp. 1556-1561, https://www.ijsr.net/getabstract.php?paperid=NOV151502



Similar Articles

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 9, September 2024

Pages: 1075 - 1080

Improving Health Information Security in Mobile Cloud Computing with Blockchain and Modular Encryption Techniques

Vikasa Bheemashankara Pateela, K Rahul Krishna, Dr. Krishna Kumar P R, Triveni N

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, Bangladesh, Volume 11 Issue 7, July 2022

Pages: 1076 - 1080

Issues in IT & Information Security System Development

Shakila Shams, M. Abdus Sobhan, Farruk Ahmed, Ali Shihab Sabbir

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 8 Issue 4, April 2019

Pages: 2003 - 2009

Enhancing Scalability in Cloud Computing: Strategies and Best Practices

Sai Tarun Kaniganti

Share this Article

Downloads: 101

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article



Top