Defenses To Protect Against SQL Injection Attacks

Web applications are steadily increasing in our daily routines activities and continue to integrate them. Online Banking, On-line reservations, on-line shopping expect these web applications to be secure and reliable; the terror of SQL– Injection Attacks has become increasingly frequent and serious. SQL Injection Attacks are one of the topmost threats for web application security. Using SQL Injection attackers can leak confidential information: such as credit card numbers, ATM pins, User credentials from web applications and even corrupt the database. This paper presents a new technique to protect Web applications against SQL injection Attacks. SQL Injection Attacks are a class of attacks that many of these systems are highly vulnerable to, and there is no known foolproof defense against such attacks. In this paper, some predefined methods are discussed and integrated approach of encryption method with secure hashing is applied in the database to avoid attack on login phase. This combined method is applied to a system where user’s information is kept and the designing of this system are done by using PHP and MYSQL. Index –Terms: Database security, SQL injection attacks, Hashing, Encryption technique, Preventions.

[1]  Sayyed Mohammad Sadegh Sajjadi,et al.  Study of SQL Injection Attacks and Countermeasures , 2013 .

[2]  Alessandro Orso,et al.  SQL Injection Attacks , 2011, Encyclopedia of Cryptography and Security.

[3]  S. Panda,et al.  Protection of Web Application against Sql Injection Attacks , 2013 .

[4]  Alessandro Orso,et al.  A Classification of SQL Injection Attacks and Countermeasures , 2006, ISSSE.

[5]  Dirk Fox,et al.  Open Web Application Security Project , 2006, Datenschutz und Datensicherheit - DuD.

[6]  Zhou Guo-xiang SQL Injection Attacks in Web Application , 2010 .

[7]  A. Tajpour,et al.  Evaluation of SQL Injection Detection and Prevention Techniques , 2010, 2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks.

[8]  Shubham Srivastava,et al.  Attacks Due to SQL Injection & Their Prevention Method for Web-Application , 2012 .