About SQL Injection Attack

Author(s):  
Sunil Gupta
2021 ◽  
Author(s):  
ZhongDong Zhu ◽  
ShiLin Jia ◽  
JiShuai Li ◽  
SuJuan Qin ◽  
Hui Guo

2015 ◽  
pp. 901-904
Author(s):  
Hongmin Li ◽  
Min Lu ◽  
Jianping Zhang ◽  
Xiaofang Huang

2019 ◽  
Vol 8 (4) ◽  
pp. 2827-2833

The SQL injection attack (SQLIA) occurred when the attacker integrating a code of a malicious SQL query into a valid query statement via a non-valid input. As a result the relational database management system will trigger these malicious query that cause to SQL injection attack. After successful execution, it may interrupts the CIA (confidentiality, integrity and availability) of web API. The vulnerability of Web Application Programming Interface (API) is the prior concern for any programming. The Web API is mainly based of Simple Object Access Protocol (SOAP) protocol which provide its own security and Representational State Transfer (REST) is provide the architectural style to security measures form transport layer. Most of the time developers or newly programmers does not follow the standards of safe programming and forget to validate their input fields in the form. This vulnerability in the web API opens the door for the threats and it’s become a cake walk for the attacker to exploit the database associated with the web API. The objective of paper is to automate the detection of SQL injection attack and secure the poorly coded web API access through large network traffic. The Snort and Moloch approaches are used to develop the hybrid model for auto detection as well as analyze the SQL injection attack for the prototype system


Author(s):  
Roshni Chandrashekhar ◽  
Manoj Mardithaya ◽  
Santhi Thilagam ◽  
Dipankar Saha

Sign in / Sign up

Export Citation Format

Share Document