A Survey Of Sql Injection Countermeasures

  • Mahapatra R
N/ACitations
Citations of this article
31Readers
Mendeley users who have this article in their library.

Abstract

SQL injection has become a predominant type of attacks that target web applications. It allows attackers to obtain unauthorized access to the back-end database to change the intended application-generated SQL queries. Researchers have proposed various solutions to address SQL injection problems. However, many of them have limitations and often cannot address all kinds of injection problems. What’s more, new types of SQL injection attacks have arisen over the years. To better counter these attacks, identifying and understanding existing countermeasures are very important. In this research , I had surveyed existing techniques against SQL injection attacks and analyzed their advantages and disadvantages. In addition, I identified techniques for building secure systems and applied them to my applications and database system, and illustrated how they were performed and the effect of them.

Cite

CITATION STYLE

APA

Mahapatra, R. P. (2012). A Survey Of Sql Injection Countermeasures. International Journal of Computer Science & Engineering Survey, 3(3), 55–74. https://doi.org/10.5121/ijcses.2012.3305

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free