z-logo
open-access-imgOpen Access
SQL Injection Detection and Prevention Techniques in ASP.NET Web Application
Author(s) -
Mohammad Abu Kausar,
Mohammad Nasar,
Aiman Moyaid
Publication year - 2019
Publication title -
international journal of recent technology and engineering
Language(s) - English
Resource type - Journals
ISSN - 2277-3878
DOI - 10.35940/ijrte.c6319.098319
Subject(s) - sql injection , computer science , sort , sql , computer security , reputation , database , private information retrieval , autocommit , web application , process (computing) , world wide web , query by example , operating system , social science , sociology , web search query , search engine
Injection in SQL (structure query language) is one of the threats to web-based apps, mobile apps and even desktop applications associated to the database. An effective SQL Injection Attacks (SQLIA) could have severe implications for the victimized organization including economic loss, loss of reputation, enforcement and infringement of regulations. Systems which do not validate the input of the user correctly make them susceptible to SQL injection. SQLIA happens once an attacker can incorporate a sequence of harmful SQL commands into a request by changing back-end database through user information. To use this sort of attacks may readily hack applications and grab the private information by the attacker. In this article we introduce deferential sort of process to safeguard against current SQLIA method and instruments that are used in ASP.NET apps to detect or stop these attacks.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here