Defensive Approaches on SQL Injection and Cross-Site Scripting Attacks

info.icomtechnologies
info.icomtechnologies
Venkatramulu Sunkari
Venkatramulu Sunkari
Dr. C.V Guru Rao
Dr. C.V Guru Rao

Send Message

To: Author

Defensive Approaches on SQL Injection and Cross-Site Scripting Attacks

Article Fingerprint

ReserarchID

CSTNWS9V882

Defensive Approaches on SQL Injection and Cross-Site Scripting Attacks Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu
Font Type
Font Size
Font Size
Bedground

Abstract

SQL Injection attacks are the most common attacks on the web applications. Statistical analysis says that so many web sites which interact with the database are prone to SQL Injection/XSS attacks. Different kinds of vulnerability detection system and attack detection systems exist, there is no efficient system for detecting these kinds of attacks. SQL Injection attacks are possible due to the design drawbacks of the websites which interact with back-end databases. Successful attacks may damage more. The state-of-art web application input validation echniques fails to identify the proper SQL/XSS Vulnerabilities accurately because of the systems correctness of sanity checking capability, proper placement of valuators on the applications. The systems fail while processing HTTP Parameter pollution attacks. An extensive survey on the SQL Injection attacks is conducted to present various detection and prevension mechanisms.

References

11 Cites in Article
  1. P (2008). Software assurance tools: Web application security scanner.
  2. M Muthuprasanna,Ke Wei,Suraj Kothari (2006). Eliminating SQL Injection Attacks - A Transparent Defense Mechanism.
  3. Hossain Shahriar,Mohammad Zulkernine (2008). MUSIC: Mutation-based SQL Injection Vulnerability Checking.
  4. R Mcclure,I Krger (2005). SQL DOM: compile time checking of dynamic SQL statements.
  5. Tania Basso,Plinio Fernandes,Mario Jino,Regina Moraes (2010). Analysis of the effect of Java software faults on security vulnerabilities and their detection by commercial web vulnerability scanner tool.
  6. H Huang,J Tan,L Liu (2009). Countermeasure Techniques for Deceptive Phishing Attack.
  7. A Morais,E Martins,A Cavalli,W Jimenez (2009). Security Protocol Testing Using Attack Trees.
  8. Supriya Madan,Sushila Madan (2009). Shielding against SQL Injection Attacks Using ADMIRE Model.
  9. Parvaiz Khand (2009). System level security modeling using attack trees.
  10. N Jovanovic,C Kruegel,E Kirda (2006). Pixy: a static analysis tool for detecting Web application vulnerabilities.
  11. K Karppinen,M Lindvall,L Yonkwa (2008). Detecting Security Vulnerabilities with Software Architecture Analysis Tools.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

info.icomtechnologies. 2014. \u201cDefensive Approaches on SQL Injection and Cross-Site Scripting Attacks\u201d. Global Journal of Computer Science and Technology - E: Network, Web & Security GJCST-E Volume 14 (GJCST Volume 14 Issue E2).

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Keywords
Version of record

v1.2

Issue date
June 1, 2014

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 9216
Total Downloads: 2450
2026 Trends
Related Research
Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Defensive Approaches on SQL Injection and Cross-Site Scripting Attacks

Venkatramulu Sunkari
Venkatramulu Sunkari
Dr. C.V Guru Rao
Dr. C.V Guru Rao

Research Journals