Securing SQL Injection flaw

被引:0
作者
Rajadurai, R. [1 ]
Bhadrinath, V. [1 ]
Anandhavel, B. [1 ]
Danapaquiame, N. [1 ]
Amudhavel, J. [2 ]
机构
[1] Sri ManakulaVinayagar Engn Coll, Dept CSE, Pondicherry, India
[2] KL Univ, Dept CSE, Guntur, Andhra Pradesh, India
来源
BIOSCIENCE BIOTECHNOLOGY RESEARCH COMMUNICATIONS | 2018年 / 11卷 / 01期
关键词
NETWORK SECURITY; WEB SECURITY; PREDICTIVE ANALYSIS; INJECTION FLAW; VULNERABILITY AND SQL DATABASE;
D O I
暂无
中图分类号
Q81 [生物工程学(生物技术)]; Q93 [微生物学];
学科分类号
071005 ; 0836 ; 090102 ; 100705 ;
摘要
SQL injection flaw is predominant in last few years of network security. By exploiting the input validation, the attacker can inject the SQL injection query from the front end to explore the back end data stored in the database. Securing of data from the attacker who involved in injection flaw is becoming more challenging. We proposed an approach to detect the injection attack query and retrieving back the access control from where it last. We are utilizing pattern matching technique and token management technique. KMP (Knuth Morris Pratt) pattern searching algorithm is used for validation of input queries and token management technique is used to retrieve back the access control from where it last. Since provision of both prevention and recovery process makes the system more secure than the existing one.
引用
收藏
页码:65 / 74
页数:10
相关论文
共 15 条
[1]  
Ahilandeswari T, 2016, INT RES J ADV ENG SC, V2, P1
[2]  
Ali Abdul Bashah Mat, 2010, SQL INJECTION VULNER
[3]  
[Anonymous], PROCEDIA COMPUTER SC, V3, P453
[4]  
Anusha B, 2015, INT RES J ADV ENG SC, V1, P1
[5]  
Deepa G, 2016, ELSEVIER J INFORM SO, V2, P1051
[6]  
Dharshini G, 2016, INT RES J ADV ENG SC, V2, P1
[7]  
Gayathri R, 2016, INT RES J ADV ENG SC, V2, P22
[8]  
Govindharaj I, 2016, INT RES J ADV ENG SC, V2, P7
[9]   SQLiGoT: Detecting SQL injection attacks using graph of tokens and SVM [J].
Kar, Debabrata ;
Panigrahi, Suvasini ;
Sundararajan, Srikanth .
COMPUTERS & SECURITY, 2016, 60 :206-225
[10]  
Kumar A, 2015, IEEE 7 INT S CYB SAF, P24