A Survey on the Detection of SQL Injection Attacks and Their Countermeasures

Bharti Nagpal, Naresh Chauhan and Nanhay Singh
Online First Paper
10.3745/JIPS.03.0024
Keywords: Dynamic Analysis, Detection, Prevention, SQL Injection Attack, Static Analysis, Vulnerabilities
Full Text:

Abstract
The Structured Query Language (SQL) Injection continues to be one of greatest security risks in the world according to the Open Web Application Security Project’s (OWASP)[1] Top 10 Security vulnerabilities 2013. The ease of exploitability and severe impact puts this attack at the top. As the countermeasures become more sophisticated, SOL Injection Attacks also continue to evolve, thus thwarting the attempt to eliminate this attack completely. The vulnerable data is a source of worry for government and financial institutions. In this paper, a detailed survey of different types of SQL Injection and proposed methods and theories are presented, along with various tools and their efficiency in intercepting and preventing SQL attacks.

Article Statistics
Statistical data for 'online first' paper are not collected.

Cite this article
IEEE Style
Bharti Nagpal, Naresh Chauhan, and Nanhay Singh, "A Survey on the Detection of SQL Injection Attacks and Their Countermeasures," Journal of Information Processing Systems. DOI: 10.3745/JIPS.03.0024.

ACM Style
Bharti Nagpal, Naresh Chauhan, and Nanhay Singh, "A Survey on the Detection of SQL Injection Attacks and Their Countermeasures," Journal of Information Processing Systems, DOI: 10.3745/JIPS.03.0024.