Analysis of SQL Injections Attacks and Vulnerabilities

SQL is a code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker). SQL injection must exploit a security vulnerability in an application's software, for example, when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and unexpectedly executed.

[1]  Alessandro Orso,et al.  WASP: Protecting Web Applications Using Positive Tainting and Syntax-Aware Evaluation , 2008, IEEE Transactions on Software Engineering.

[2]  Alfred Basta,et al.  Computer Security and Penetration Testing , 2007 .

[3]  Zhou Guo-xiang SQL Injection Attacks in Web Application , 2010 .

[4]  Alessandro Orso,et al.  AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks , 2005, ASE.

[5]  Jin-Cherng Lin,et al.  The Automatic Defense Mechanism for Malicious Injection Attack , 2007, 7th IEEE International Conference on Computer and Information Technology (CIT 2007).

[6]  Angelos D. Keromytis,et al.  SQLrand: Preventing SQL Injection Attacks , 2004, ACNS.

[7]  Sang-Soo Yeo,et al.  A novel method for SQL injection attack detection based on removing SQL query attribute values , 2012, Math. Comput. Model..

[8]  Abhishek Kumar Baranwal Approaches to detect SQL injection and XSS in web applications , 2012 .

[9]  Zhendong Su,et al.  The essence of command injection attacks in web applications , 2006, POPL '06.

[10]  Deevi Radha Rani,et al.  Web Security by Preventing SQL Injection Using Encryption in Stored Procedures , 2012 .

[11]  Zeinab Raveshi,et al.  Investigation and Analysis of SQL Injection Attacks on Web Applications: Survey , 2013 .

[12]  Michael D. Ernst,et al.  Automatic creation of SQL Injection and cross-site scripting attacks , 2009, 2009 IEEE 31st International Conference on Software Engineering.

[13]  S. Panda,et al.  Protection of Web Application against Sql Injection Attacks , 2013 .

[14]  Mei Junjin,et al.  An Approach for SQL Injection Vulnerability Detection , 2009, 2009 Sixth International Conference on Information Technology: New Generations.

[15]  Alan Newson Scanners: Network threats and vulnerability scanners , 2005 .

[16]  Konstantinos Kemalis,et al.  SQL-IDS: a specification-based approach for SQL-injection detection , 2008, SAC '08.

[17]  Craig S. Wright The IT Regulatory and Standards Compliance Handbook: How to Survive Information Systems Audit and Assessments , 2008 .

[18]  Paul Midian How to ensure an effective penetration test , 2003, Inf. Secur. Tech. Rep..

[19]  Kanchana Natarajan,et al.  Generation of Sql-injection Free Secure Algorithm to Detect and Prevent Sql-Injection Attacks , 2012 .

[20]  Xiang Chen,et al.  D-WAV: A Web Application Vulnerabilities Detection Tool Using Characteristics of Web Forms , 2010, 2010 Fifth International Conference on Software Engineering Advances.