Open Access   Article Go Back

Protecting Websites from Dissociative Identity SQL Injection Attack- a Patch for Human Folly

Aman Prasad1 , Gangasagar Pitla2 , Satish Patil3 , . Rachana Patil4

Section:Review Paper, Product Type: Conference Paper
Volume-04 , Issue-02 , Page no. 27-30, Apr-2016

Online published on May 10, 2016

Copyright © Aman Prasad, Gangasagar Pitla, Satish Patil,. Rachana Patil . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Aman Prasad, Gangasagar Pitla, Satish Patil,. Rachana Patil, “Protecting Websites from Dissociative Identity SQL Injection Attack- a Patch for Human Folly,” International Journal of Computer Sciences and Engineering, Vol.04, Issue.02, pp.27-30, 2016.

MLA Style Citation: Aman Prasad, Gangasagar Pitla, Satish Patil,. Rachana Patil "Protecting Websites from Dissociative Identity SQL Injection Attack- a Patch for Human Folly." International Journal of Computer Sciences and Engineering 04.02 (2016): 27-30.

APA Style Citation: Aman Prasad, Gangasagar Pitla, Satish Patil,. Rachana Patil, (2016). Protecting Websites from Dissociative Identity SQL Injection Attack- a Patch for Human Folly. International Journal of Computer Sciences and Engineering, 04(02), 27-30.

BibTex Style Citation:
@article{Prasad_2016,
author = {Aman Prasad, Gangasagar Pitla, Satish Patil,. Rachana Patil},
title = {Protecting Websites from Dissociative Identity SQL Injection Attack- a Patch for Human Folly},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2016},
volume = {04},
Issue = {02},
month = {4},
year = {2016},
issn = {2347-2693},
pages = {27-30},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=46},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=46
TI - Protecting Websites from Dissociative Identity SQL Injection Attack- a Patch for Human Folly
T2 - International Journal of Computer Sciences and Engineering
AU - Aman Prasad, Gangasagar Pitla, Satish Patil,. Rachana Patil
PY - 2016
DA - 2016/05/10
PB - IJCSE, Indore, INDIA
SP - 27-30
IS - 02
VL - 04
SN - 2347-2693
ER -

           

Abstract

Injection attack is a method that can inject any kind of malicious string or anomaly string on the original string. Most of the pattern based techniques are used static analysis and patterns are generated from the attacked statements. In this project, we proposed a detection and prevention technique for preventing SQL Injection Attack (SQLIA) using Aho-Corasick pattern matching algorithm. The basic goal of our project is to minimize the web-based attacks like SQL Injection Attack (SQLIA) and reduce the load of server.

Key-Words / Index Term

SQL Injection; SQL Injection Attack; Aho-Corasick Algorithm; Anomaly Scoring

References

[1] Aho, Alfred V.; Margaret J. Corasick (June 1975). "Efficient string matching: An aid to bibliographic search". Communications of the ACM 18 (6): 333–340
[2] Commentz-Walter B. A string matching algorithm fast on the average, Proc. 6th International Colloquium on Automata, Languages, and Programming (1979), pp. 118-132.
[3] Alsmadi I., Nuser M., String Matching Evaluation Methods for DNA Comparisons, International Journal of Advanced Science and Technology, Vol.47, 2012.
[4] Amir A., Lewenstein M., and Porat E., Faster Algorithms for String Matching with K-Mismatches, Journal of Algorithms 50(2004) 257-275.
[5] Gomaa N.H., Fahmy A.A., Short Answer Grading using String Similarity and Corpus-Based Similarity, International Journal of Advanced Computer Science and Applications, Vol 3,No.11, 2012.
[6] https://www.blogs.akamai.com/
[7] C.J. Ezeife, J. Dong, A.K. Aggarwal, “Sensor Web-IDS: A Web Mining Intrusion Detection System”, International Journal of Web Information Systems, volume 4, pp. 97-120, 2007