Loading...
Please wait, while we are loading the content...
Protect Web Applications against SQL Injection Attacks Using Binary Evaluation Approach
| Content Provider | Semantic Scholar |
|---|---|
| Author | Sunkari, Venkatramulu |
| Copyright Year | 2016 |
| Abstract | today’s across the globe, the data will access possibly in distant places through internet. Therefore even a unauthorized folks can access the data. The unauthorized access to data attack increases every day. SQL injection Attacks (SQLIAs) are probably the most significant associated with such web application risks. SQL shot takes advantage of the syntax of SQL to be able to inject commands that will read or maybe modify a database or compromise, this is of the main query. The product range of this kind of attacks is frequently disastrous and range from leaking associated with sensitive information to trashing customer facts. How complete people think that their information is stored safe and without any attacks. Detecting and preventing the attacks is a challenging task. The existing scenario is a highly automated approach pertaining to protecting Net applications through SQLIAs. Our approach involves certain things including identifying reliable data, making use of dynamic tainting to be able to track reliable data, and permitting only reliable data to the semantically relevant parts of queries including SQL keywords and workers. Unlike preceding approaches dependant on dynamic tainting, our technique is based on positive tainting and binary evaluation, which clearly identifies reliable (rather in comparison with untrusted) data in the program. Using this method, we get rid of the problem associated with false negatives that could result from the incomplete identification of most untrusted information sources. Our strategy against SQLIAs is based on dynamic tainting, that's previously been utilized to address security problems linked to input validation. Traditional energetic tainting strategies mark a number of untrusted information (typically end user input) while tainted, trail the stream of tainted because data with runtime, which will help prevent this information from used in potentially harmful ways. Keywords— SQL Injection, Security, web application |
| File Format | PDF HTM / HTML |
| Alternate Webpage(s) | http://ijiet.com/wp-content/uploads/2016/05/67.pdf |
| Language | English |
| Access Restriction | Open |
| Content Type | Text |
| Resource Type | Article |