z-logo
open-access-imgOpen Access
SQL Injection Attack on Web Application
Author(s) -
S. Parameswari,
K. Kavitha
Publication year - 2018
Publication title -
asian journal of computer science and technology
Language(s) - English
Resource type - Journals
eISSN - 2583-7907
pISSN - 2249-0701
DOI - 10.51983/ajcst-2018.7.s1.1814
Subject(s) - sql injection , computer science , summons , sql , stored procedure , user defined function , data transformation services , database , query by example , string (physics) , web application , autocommit , computer security , world wide web , web search query , search engine , mathematics , political science , law , mathematical physics
SQL injection attacks are one of the highest dangers for applications composed for the Web. These attacks are dispatched through uncommonly made client information on web applications that utilizes low level string operations to build SQL queries. An SQL injection weakness permits an assailant to stream summons straightforwardly to a web application’s hidden database and annihilate usefulness or privacy. In this paper we proposed a simplified algorithm which works on the basic features of the SQL Injection attacks and will successfully detect almost all types of SQL Injection attacks. In the paper we have also presented the experiment results in order to acknowledge the proficiency of our algorithm.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here