Defensive Approaches on SQL Injection and Cross-Site Scripting Attacks

1
info.icomtechnologies
info.icomtechnologies
2
Venkatramulu Sunkari
Venkatramulu Sunkari
3
Dr. C.V Guru Rao
Dr. C.V Guru Rao

Send Message

To: Author

GJCST Volume 14 Issue E2

Article Fingerprint

ReserarchID

CSTNWS9V882

Defensive Approaches on SQL Injection and Cross-Site Scripting Attacks Banner
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

SQL Injection attacks are the most common attacks on the web applications. Statistical analysis says that so many web sites which interact with the database are prone to SQL Injection/XSS attacks. Different kinds of vulnerability detection system and attack detection systems exist, there is no efficient system for detecting these kinds of attacks. SQL Injection attacks are possible due to the design drawbacks of the websites which interact with back-end databases. Successful attacks may damage more. The state-of-art web application input validation echniques fails to identify the proper SQL/XSS Vulnerabilities accurately because of the systems correctness of sanity checking capability, proper placement of valuators on the applications. The systems fail while processing HTTP Parameter pollution attacks. An extensive survey on the SQL Injection attacks is conducted to present various detection and prevension mechanisms.

11 Cites in Articles

References

  1. P (2008). Software assurance tools: Web application security scanner.
  2. M Muthuprasanna,Ke Wei,Suraj Kothari (2006). Eliminating SQL Injection Attacks - A Transparent Defense Mechanism.
  3. Hossain Shahriar,Mohammad Zulkernine (2008). MUSIC: Mutation-based SQL Injection Vulnerability Checking.
  4. R Mcclure,I Krger (2005). SQL DOM: compile time checking of dynamic SQL statements.
  5. Tania Basso,Plinio Fernandes,Mario Jino,Regina Moraes (2010). Analysis of the effect of Java software faults on security vulnerabilities and their detection by commercial web vulnerability scanner tool.
  6. H Huang,J Tan,L Liu (2009). Countermeasure Techniques for Deceptive Phishing Attack.
  7. A Morais,E Martins,A Cavalli,W Jimenez (2009). Security Protocol Testing Using Attack Trees.
  8. Supriya Madan,Sushila Madan (2009). Shielding against SQL Injection Attacks Using ADMIRE Model.
  9. Parvaiz Khand (2009). System level security modeling using attack trees.
  10. N Jovanovic,C Kruegel,E Kirda (2006). Pixy: a static analysis tool for detecting Web application vulnerabilities.
  11. K Karppinen,M Lindvall,L Yonkwa (2008). Detecting Security Vulnerabilities with Software Architecture Analysis Tools.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

info.icomtechnologies. 2014. \u201cDefensive Approaches on SQL Injection and Cross-Site Scripting Attacks\u201d. Global Journal of Computer Science and Technology - E: Network, Web & Security GJCST-E Volume 14 (GJCST Volume 14 Issue E2): .

Download Citation

Issue Cover
GJCST Volume 14 Issue E2
Pg. 77- 82
Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Keywords
Classification
Not Found
Version of record

v1.2

Issue date

June 1, 2014

Language

English

Experiance in AR

The methods for personal identification and authentication are no exception.

Read in 3D

The methods for personal identification and authentication are no exception.

Article Matrices
Total Views: 9157
Total Downloads: 2231
2026 Trends
Research Identity (RIN)
Related Research

Published Article

SQL Injection attacks are the most common attacks on the web applications. Statistical analysis says that so many web sites which interact with the database are prone to SQL Injection/XSS attacks. Different kinds of vulnerability detection system and attack detection systems exist, there is no efficient system for detecting these kinds of attacks. SQL Injection attacks are possible due to the design drawbacks of the websites which interact with back-end databases. Successful attacks may damage more. The state-of-art web application input validation echniques fails to identify the proper SQL/XSS Vulnerabilities accurately because of the systems correctness of sanity checking capability, proper placement of valuators on the applications. The systems fail while processing HTTP Parameter pollution attacks. An extensive survey on the SQL Injection attacks is conducted to present various detection and prevension mechanisms.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]
×

This Page is Under Development

We are currently updating this article page for a better experience.

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Defensive Approaches on SQL Injection and Cross-Site Scripting Attacks

Venkatramulu Sunkari
Venkatramulu Sunkari
Dr. C.V Guru Rao
Dr. C.V Guru Rao

Research Journals