Showing posts with label image processing. Show all posts
Showing posts with label image processing. Show all posts

Monday, August 24, 2015

Understanding SQL Injection Attack Techniques and Implementation of Various Methods for Attack Detection and Prevention

Author(s):

Shruti Gangan , V.E.S INSTITUTE OF TECHNOLOGY, CHEMBUR; 
Tina Gyanchandani, V.E.S INSTITUTE OF TECHNOLOGY, CHEMBUR; 
Dhanamma Jagli, V.E.S INSTITUTE OF TECHNOLOGY, CHEMBUR

Keywords:

SQL Injection, Website Security, SQL Injection Detection, SQL Injection Prevention, Sanitization

Abstract

Security issues of different database driven web applications are continue to be an important and crucial aspect of the ongoing development of the Internet. In the last several decades, Web applications have brought new classes of computer security vulnerabilities, such as AQL injection. SQL Injection Attacks (SQLIAs) is one of the most severe threats to the security of database driven web applications as it compromises integrity and confidentiality of information in database. In this type of attack, an attacker gain control over the database of an application and consequently, he/she may be able to alter data. In this paper we present different types of SQL injection attacks and also implementation of different types of tools which can be used to detect and prevent these attacks.

Click Here to see Full Length Paper : 
http://www.ijsrd.com/Article.php?manuscript=IJSRDV3I40489

Good Research Journal For Engineering Students.....IJSRD.com