Defensive Approaches on SQL Injection and Cross-Site Scripting Attacks

Article ID

CSTNWS9V882

Defensive Approaches on SQL Injection and Cross-Site Scripting Attacks

Venkatramulu Sunkari
Venkatramulu Sunkari
Dr. C.V Guru Rao
Dr. C.V Guru Rao
DOI

Abstract

SQL Injection attacks are the most common attacks on the web applications. Statistical analysis says that so many web sites which interact with the database are prone to SQL Injection/XSS attacks. Different kinds of vulnerability detection system and attack detection systems exist, there is no efficient system for detecting these kinds of attacks. SQL Injection attacks are possible due to the design drawbacks of the websites which interact with back-end databases. Successful attacks may damage more. The state-of-art web application input validation echniques fails to identify the proper SQL/XSS Vulnerabilities accurately because of the systems correctness of sanity checking capability, proper placement of valuators on the applications. The systems fail while processing HTTP Parameter pollution attacks. An extensive survey on the SQL Injection attacks is conducted to present various detection and prevension mechanisms.

Defensive Approaches on SQL Injection and Cross-Site Scripting Attacks

SQL Injection attacks are the most common attacks on the web applications. Statistical analysis says that so many web sites which interact with the database are prone to SQL Injection/XSS attacks. Different kinds of vulnerability detection system and attack detection systems exist, there is no efficient system for detecting these kinds of attacks. SQL Injection attacks are possible due to the design drawbacks of the websites which interact with back-end databases. Successful attacks may damage more. The state-of-art web application input validation echniques fails to identify the proper SQL/XSS Vulnerabilities accurately because of the systems correctness of sanity checking capability, proper placement of valuators on the applications. The systems fail while processing HTTP Parameter pollution attacks. An extensive survey on the SQL Injection attacks is conducted to present various detection and prevension mechanisms.

Venkatramulu Sunkari
Venkatramulu Sunkari
Dr. C.V Guru Rao
Dr. C.V Guru Rao

No Figures found in article.

info.icomtechnologies. 2014. “. Global Journal of Computer Science and Technology – E: Network, Web & Security GJCST-E Volume 14 (GJCST Volume 14 Issue E2): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Issue Cover
GJCST Volume 14 Issue E2
Pg. 77- 82
Classification
Not Found
Keywords
Article Matrices
Total Views: 9084
Total Downloads: 2289
2026 Trends
Research Identity (RIN)
Related Research
Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Defensive Approaches on SQL Injection and Cross-Site Scripting Attacks

Venkatramulu Sunkari
Venkatramulu Sunkari
Dr. C.V Guru Rao
Dr. C.V Guru Rao

Research Journals