Research Article

Prevention of SQL Injection by Self Generating Triplet Patterns

by  Abhay K. Kolhe, Pratik Adhikari
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 93 - Issue 15
Published: May 2014
Authors: Abhay K. Kolhe, Pratik Adhikari
10.5120/16289-5526
PDF

Abhay K. Kolhe, Pratik Adhikari . Prevention of SQL Injection by Self Generating Triplet Patterns. International Journal of Computer Applications. 93, 15 (May 2014), 6-8. DOI=10.5120/16289-5526

                        @article{ 10.5120/16289-5526,
                        author  = { Abhay K. Kolhe,Pratik Adhikari },
                        title   = { Prevention of SQL Injection by Self Generating Triplet Patterns },
                        journal = { International Journal of Computer Applications },
                        year    = { 2014 },
                        volume  = { 93 },
                        number  = { 15 },
                        pages   = { 6-8 },
                        doi     = { 10.5120/16289-5526 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2014
                        %A Abhay K. Kolhe
                        %A Pratik Adhikari
                        %T Prevention of SQL Injection by Self Generating Triplet Patterns%T 
                        %J International Journal of Computer Applications
                        %V 93
                        %N 15
                        %P 6-8
                        %R 10.5120/16289-5526
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

The paper is focused with the new prevention method for SQL injection as it is always the top threat to any web site or web application. The paper focus generation of the pattern from the training query to prevent the SQL injection for the new query by forming triplet pattern. The new concept of matching pattern ratio has been introduced in the paper. In the last section advantages and the disadvantages of the method is discussed.

References
  • Nontarak, S. Leelawat T, "Securely Web-Based Application for Construction Material Testing" International Journal of Computer Applications (0975 – 8887) Volume 42– No. 11, March 2012 .
  • http://php. net/manual/en/function. mySQL-real-escape-string. php 26 Nov 2013
  • http://www. php. net/manual/en/mySQLi. quickstart. multiple-statement. php 26 Nov 2013
  • Preshika Tiwari, Ashish Kumar Srivastava, " A Survey on Authentication Mechanism against SQL Injection in XML" International Journal of Computer Applications (0975 – 8887) Volume 78 – No. 7, September 2013.
  • Abhay K. Kolhe, Pratik Adhikari "Injection, Detection, Prevention of SQL Injection Attacks" International Journal of Computer Applications (0975 – 8887) Volume 87 – No. 7, February 2014.
  • Gaurav Shrivastava, Kshitij Pathak, "SQL Injection Attacks: Technique and Prevention Mechanism" International Journal of Computer Applications (0975 – 8887) Volume 69– No. 7, May 2013.
  • https://www. owasp. org/index. php/Testing_for_SQL_Injection_(OWASP-DV-005) 16th Feb 2014
  • http://www. sqlinjectionwiki. com/Categories. aspx?catId=1 16th Feb 2014
  • http://www. bbc. co. uk/bitesize/higher/biology/cell_biology/rna/revision/2/
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

SQL injection SQL injection vulnerability web security prevention of SQL injection

Powered by PhDFocusTM