SQL Injection Attack Roadmap and Fusion

  • Umar K
  • Bakar Md Sultan A
  • Zulzalil H
  • et al.
N/ACitations
Citations of this article
7Readers
Mendeley users who have this article in their library.

Abstract

With SQL Injection, an attacker can change the intended effect of dynamically generated query in a web Application. This can lead to unauthorized access to the database underlying web application, and harmful transactions on the potentially sensitive information contained in the database. Clear understanding of a problem always assists in finding stronger solution to the problem. In this paper, we conducted an extensive review of several empirical studies on SQL injection attacks and vulnerabilities, with the goal of providing the research community with better insight into possible relationship that exists between different types of SQL Injection Attacks (SQLIAs), and the types of vulnerabilities exploited by each. Consequently, the result of our study is presentation of SQLIAs fusion which shows how different types of SQLIAs lead to one another, and also presentation of step by step SQLIA roadmap. We are very optimistic that our study can help the research community with clearer understanding of SQL Injections, and thus facilitates emergence of stronger solutions to the long standing problem.

Cite

CITATION STYLE

APA

Umar, K., Bakar Md Sultan, A., Zulzalil, H., Admodisastro, N., & Taufik Abdullah, M. (2016). SQL Injection Attack Roadmap and Fusion. Indian Journal of Science and Technology, 9(28). https://doi.org/10.17485/ijst/2016/v9i28/97810

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free