Loading

Detection of SQL Injection Attack and Various Prevention Strategies
Priyanka1, Vijay Kumar Bohat2
1Priyanka, Pursuing M. Tech in Computer Science and Engineering from Lovely Professional University, Punjab, India.
2Vijay Kumar Bohat, Computer Science and Engineering from Lovely Professional University, Punjab, India.
Manuscript received on March 19, 2013. | Revised Manuscript received on April 11, 2013. | Manuscript published on April 30, 2013. | PP: 457-460 | Volume-2, Issue-4, April 2013. | Retrieval Number: D1462042413/2013©BEIESP

Open Access | Ethics and Policies | Cite
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The internet is a demanding technology which is working its way into all aspects of our civilization. So security is the main critical part in our daily life. The requirements of information security and website security within an organization have undergone several changes in the last several decades. Security is a broad topic and covers a multitude of sins. This paper is written with the basic programmer and information security expert, explaining the concepts which are needed to read through the hype in the market place and understand the risks and how to deal with them. We go on to consider risk management, network threats, firewalls, protection from SQL Injection. SQL Injection is a web attack mechanisms which is being used by hackers to misuse the data of that website. It is hoped that this paper will help the reader to provide a wider perspective on security and better understand how to handle and manage risk related to security issues of website personally at client–end and at server-end.
Keywords: SQL Injection; SQL Injection prevention; SQL Injection detection; Website security.