A Survey on SQL Injection Attacks Types & their Prevention Techniques
In the world of connectedness even more than ever before we are using digital technologies in daily life from bank transactions to social networking. While all of this data is residing in databases and with increasing usage, the importance of confidentiality and integrity of the data seems to be a c...
Gespeichert in:
Veröffentlicht in: | Journal of independent studies and research computing 2023-12, Vol.21 (2) |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | In the world of connectedness even more than ever before we are using digital technologies in daily life from bank transactions to social networking. While all of this data is residing in databases and with increasing usage, the importance of confidentiality and integrity of the data seems to be a challenging and most pressing issue of today’s world. SQL injection are commonly used attacks to gain access to unauthorized data and one such example out of many where an attacker breach the corporate system and stole 130 million credit card details and even after two decades, SQL injection is still one of top ten security threats by open web application security project (OWASP) moving forward with more digitalization in the future it will always be a serious concern since it impacts the core principle of information security such as confidentiality, integrity and availability. In this research project I will be discussing the types of SQL injection mainly in-band, inferential and out of band attacks and keeping scope over in-band SQL injection to further discuss prevention techniques using traditional methods and lastly discussing some of the prevention techniques using advanced algorithms of machine learning and deep learning in the literature. |
---|---|
ISSN: | 2412-0448 1998-4154 |
DOI: | 10.31645/JISRC.23.21.2.1 |