Skip to Main Content
Skip Nav Destination
ASME Press Select Proceedings
International Conference on Computer Research and Development, 5th (ICCRD 2013)
Fan Yama
Fan Yama
Search for other works by this author on:
No. of Pages:
ASME Press
Publication date:

SQL injection is serious threat for web applications these days because the injectors are well-advance in the technology and there loopholes in the web application & browsers. SQL injection may allow attackers to get unrestricted access to database. The injection will result to leak of sensitive information to the attacker and the attacker use this information for their purpose why they hacked for. There are many proposals from researchers but they are somehow failed or failed to address the full scope of the SQL injection. There are many reasons why researches proposed solution for subset of SQL injection. Implementing the full known SQL injection may block the use of SQL quires in the application. Another one with the technology attackers using new methods of injection so there is a need to update the proposal. With all these I am proposing a new idea which works fine for known injections and easy updatable for future. This is mostly conceptual paper which is to get suggestion from the experts on this area to implement most right algorithm and pattern matching for SQL injection.

1. Introduction
2. Characteristic of SQL Injection
3. Prposed Technique
4. Related Work
5. Discussion
6. Conclusion
This content is only available via PDF.
You do not currently have access to this chapter.
Close Modal

or Create an Account

Close Modal
Close Modal