Publication Type : Book Chapter
Publisher : Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics: ICACNI 2015.
Source : Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics: ICACNI 2015, Volume 2, Springer India, New Delhi, p.417–426 (2016)
Url : http://dx.doi.org/10.1007/978-81-322-2529-4_44
ISBN : 9788132225294
Keywords : SQL injection, SQLIA, Web-attacks
Campus : Coimbatore
School : School of Engineering
Department : Computer Science
Year : 2016
Abstract : The computer world is definitely familiar with SQL as it plays a major role in the development of web applications. Almost all applications have data to be stored for future reference and most of them use RDBMS. Many applications choose its backend from the SQL variants. Large and important applications like the bank and credit-cards will have highly sensitive data in their databases. With the incredible advancement in technology, almost no data can survive the omniscient eyes of the attackers. The only thing that can be done is to make the attackers work difficult. The conventional fixes help in the prevention of attacks to an extent. However, there is a need for some authentic work about the effectiveness of these fixes. In this paper, we present a study of the popular SQL Injection Attack (SQLIA) techniques and the effectiveness of conventional fixes in reducing them. For addressing the SQLIA’s in depth, a thorough background study was done and the mitigation techniques were evaluated using both automated and manual testing. We took the help of a renowned penetration testing tool, SQLMap, for the automated testing. The results indicate the importance of incorporating these mitigation techniques in the code apart from going for complex fixes that require both effort and time.
Cite this Research Publication : S. Joseph and Jevitha, K. P., “Evaluating the Effectiveness of Conventional Fixes for SQL Injection Vulnerability”, in Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics: ICACNI 2015, Volume 2, A. Nagar, Mohapatra, P. Durga, and Chaki, N., Eds. New Delhi: Springer India, 2016, pp. 417–426.