With SQL Injection, an attacker can change the intended effect of dynamically generated query in a web Application. This can lead to unauthorized access to the database underlying web application, and harmful transactions on the potentially sensitive information contained in the database. Clear understanding of a problem always assists in finding stronger solution to the problem. In this paper, we conducted an extensive review of several empirical studies on SQL injection attacks and vulnerabilities, with the goal of providing the research community with better insight into possible relationship that exists between different types of SQL Injection Attacks (SQLIAs), and the types of vulnerabilities exploited by each. Consequently, the result of our study is presentation of SQLIAs fusion which shows how different types of SQLIAs lead to one another, and also presentation of step by step SQLIA roadmap. We are very optimistic that our study can help the research community with clearer understanding of SQL Injections, and thus facilitates emergence of stronger solutions to the long standing problem.
CITATION STYLE
Umar, K., Bakar Md Sultan, A., Zulzalil, H., Admodisastro, N., & Taufik Abdullah, M. (2016). SQL Injection Attack Roadmap and Fusion. Indian Journal of Science and Technology, 9(28). https://doi.org/10.17485/ijst/2016/v9i28/97810
Mendeley helps you to discover research relevant for your work.