197
An Approach to Detect and Prevent SQL Injection Attacks in
Database Using Web Service
IndraniBalasundaram 1 Dr. E. Ramaraj2
1
Lecturer, Department of Computer Science, Madurai Kamaraj University, Madurai
2
Director of Computer Centre Alagappa University, Karaikudi.
Abstract
SQL injection is an attack methodology that targets the data residing in a database through the firewall that shields it. The attack takes advantage of poor input validation in code and website administration. SQL Injection Attacks occur when an attacker is able to insert a series of SQL statements in to a
‘query’ by manipulating user input data in to a web-based application, attacker can take advantages of web application programming security flaws and pass unexpected malicious SQL statements through a web application for execution by the backend database. This paper proposes a novel specification-based methodology for the prevention of SQL injection Attacks. The two most important advantages of the new approach against existing analogous mechanisms are that, first, it prevents all forms of SQL injection attacks; second, Current technique does not allow the user to access database directly in database server.
The innovative technique “Web Service Oriented XPATH
Authentication Technique” is to detect and prevent SQLInjection Attacks in database the deployment of this technique is by generating functions of two filtration models that are Active
Guard and Service Detector of application scripts additionally allowing seamless integration with currently-deployed systems.
General Terms
Languages, Security, Verification, Experimentation.
Keywords
Database security, world-wide web, web application security,
SQL injection attacks, Runtime Monitoring
changes to data. The fear of SQL injection attacks has become increasingly frequent and serious. .
References: Attacks”, ASE’05, November 7–11, 2005 [2] William G.J Spring 2006, May 17, 2006 [4] William G.J Web applications”, http://www.spidynamics.com/support/whitepapers/, 2003 Applications,” White paper, Next Generation Security Software Ltd., 2002. Attacks,” 3rd International Workshop on Dynamic Analysis, 2005, pp ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2006, pp Workshop on Specification and Verification of componentBased Systems (SAVCBS 2004), pages 70–78, 2004. Black Hat Briefings, Black Hat USA, 2005. [18] Kals, S., Kirda, E., Kruegel, C., and Jovanovic, N. 2006.