A Survey on the Detection of SQL Injection Attacks and Their Countermeasures


Bharti Nagpal, Naresh Chauhan, Nanhay Singh, Journal of Information Processing Systems Vol. 13, No. 4, pp. 689-702, Aug. 2017  

10.3745/JIPS.03.0024
Keywords: Dynamic Analysis, Detection, Prevention, SQL Injection Attack, Static Analysis, Vulnerabilities
Fulltext:

Abstract

The Structured Query Language (SQL) Injection continues to be one of greatest security risks in the world according to the Open Web Application Security Project’s (OWASP)[1] Top 10 Security vulnerabilities 2013. The ease of exploitability and severe impact puts this attack at the top. As the countermeasures become more sophisticated, SOL Injection Attacks also continue to evolve, thus thwarting the attempt to eliminate this attack completely. The vulnerable data is a source of worry for government and financial institutions. In this paper, a detailed survey of different types of SQL Injection and proposed methods and theories are presented, along with various tools and their efficiency in intercepting and preventing SQL attacks.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.




Cite this article
[APA Style]
Nagpal, B., Chauhan, N., & Singh, N. (2017). A Survey on the Detection of SQL Injection Attacks and Their Countermeasures. Journal of Information Processing Systems, 13(4), 689-702. DOI: 10.3745/JIPS.03.0024.

[IEEE Style]
B. Nagpal, N. Chauhan, N. Singh, "A Survey on the Detection of SQL Injection Attacks and Their Countermeasures," Journal of Information Processing Systems, vol. 13, no. 4, pp. 689-702, 2017. DOI: 10.3745/JIPS.03.0024.

[ACM Style]
Bharti Nagpal, Naresh Chauhan, and Nanhay Singh. 2017. A Survey on the Detection of SQL Injection Attacks and Their Countermeasures. Journal of Information Processing Systems, 13, 4, (2017), 689-702. DOI: 10.3745/JIPS.03.0024.