RETRACTED: SQL Injection-Database Attack Revolution and Prevention

Retracted:

This paper has been retracted by publisher due to author misconduct and unethical behavior.
This paper was found to be in violation of the scope and quality criteria. The document is now considered retracted. Due to strong violation, necessary effort should be made to remove all further references to this paper.
We regret any inconvenience this publication might cause you.

Article Preview

Abstract:

Retracted paper: SQL injection came with a bang and caused revolution in database attacking. Inrecent years, with the explosion in web-based commerce and information systems, databases havebeen drawing ever closer to the network and it is critical part of network security. This paper is incorporated with our research and firsthand experience in hacking the database by SQL injection. Database is the Storage Brain of a website. A hacked database is the source for Passwords and juicy information like credit card number, bank account number and every important thing that are forbidden. Importance should be given for preventing database exploitation by SQL injection. The aim of this paper is to create awareness among web developers or database administrators about the urgent need for database security. Our ultimate objective is to totally eradicate the whole concept of SQL injection and to avoid this technique becoming a plaything in hands of exploiters.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

810-814

Online since:

March 2015

Authors:

Export:

Share:

Citation:

* - Corresponding Author

[1] http://www.greensql.net/.

Google Scholar

[2] http://www.modsecurity.org/.

Google Scholar

[3] Litchfield, David (2005) The Database Hacker's Handbook: Defending Database Servers. John Wiley & Sons © (2005).

Google Scholar

[4] http://www.oracle.com.

Google Scholar

[5] Chen Xiaobing, Zhang Hanyu, Luo Liming, the Yellow River.Research on detection technology of attack and defence of SQL injection [J]. Computer engineering and Application,2007,43 (11):150-203.

Google Scholar

[6] Qi Lin, Wang Jingyun, Cai Lingyun, Chen Ningbo. Research on detection and prevention of SQL injection attacks [J]. Journal of Hebei University Of Science and Technology, 2012, 33 (6):530-533.

Google Scholar

[7] Feng Gu, Gao Peng. Research and analysis on SQL injection technology [J].computer science, 2012, 39 (11A):415-423.

Google Scholar

[8] pan Hui. Research on the problem and strategy of SQL injection attacks [J].software guide, 2011, 10 (4):136-137.

Google Scholar

[9] Fang Wei, Fangxin. A general prevent system design and implementation of SQL injection [J]. Journal of Hunan Institute of Science and Technology (natural science edition), 2012, 25 (4):62-89.

Google Scholar

[10] Ma Kai, Cai Wandong, Yao Ye under the environment of. Injection point extracting method for SQL injection vulnerability [J]. Computer technology and development, 2013, 23 (3):121-128.

Google Scholar