International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 161 - Issue 12 |
Published: Mar 2017 |
Authors: Sudhakar Choudhary, Arvind Kumar Jain, Anil Kumar |
![]() |
Sudhakar Choudhary, Arvind Kumar Jain, Anil Kumar . A Detail Survey on Various Aspects of SQLIA. International Journal of Computer Applications. 161, 12 (Mar 2017), 34-39. DOI=10.5120/ijca2017913411
@article{ 10.5120/ijca2017913411, author = { Sudhakar Choudhary,Arvind Kumar Jain,Anil Kumar }, title = { A Detail Survey on Various Aspects of SQLIA }, journal = { International Journal of Computer Applications }, year = { 2017 }, volume = { 161 }, number = { 12 }, pages = { 34-39 }, doi = { 10.5120/ijca2017913411 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2017 %A Sudhakar Choudhary %A Arvind Kumar Jain %A Anil Kumar %T A Detail Survey on Various Aspects of SQLIA%T %J International Journal of Computer Applications %V 161 %N 12 %P 34-39 %R 10.5120/ijca2017913411 %I Foundation of Computer Science (FCS), NY, USA
While using internet for proposing online services is increasing every day, security threats in the web also increased dramatically. One of the most serious and dangerous web application vulnerabilities is SQL injection. SQL injection attack took place by inserting a portion of malicious SQL query through a non-validated input from the user into the legitimate query statement. Consequently database management system will execute these commands and it leads to SQL injection. A successful SQL injection attack interfere Confidentiality, Integrity and availability of information in the database. Based on the statistical researches this type of attack had a high impact on business. Finding the proper solution to stop or mitigate the SQL injection is necessary. To address this problem security researchers introduce different techniques to develop secure codes, prevent SQL injection attacks and detect them. In this paper the authors present a comprehensive review of different types of SQL injection and various aspects related to SQL injection attacks. Such a structural classification would further help other researchers to choose the right technique for the further studies.