Visible to the public An Emulation of Sql Injection Disclosure and Deterrence

TitleAn Emulation of Sql Injection Disclosure and Deterrence
Publication TypeConference Paper
Year of Publication2017
AuthorsLekshmi, A. S. Sai, Devipriya, V. S.
Conference Name2017 International Conference on Networks Advances in Computational Technologies (NetACT)
Keywordsauthentication, authorisation, Companies, data retrieval, Databases, Heisenberg analysis, Honey Pot, Honey pot mechanism, honey pots, human factors, information retrieval, Internet, message authentication, password, password security, pubcrawl, resilience, Resiliency, Scalability, security vulnerability, SQL, SQL Injection, SQL injection deterrence, SQL injection disclosure, Web applications, Web applications authentication, Web applications authorization
Abstract

SQL Injection is one of the most critical security vulnerability in web applications. Most web applications use SQL as web applications. SQL injection mainly affects these websites and web applications. An attacker can easily bypass a web applications authentication and authorization and get access to the contents they want by SQL injection. This unauthorised access helps the attacker to retrieve confidential data's, trade secrets and can even delete or modify valuable documents. Even though, to an extend many preventive measures are found, till now there are no complete solution for this problem. Hence, from the surveys and analyses done, an enhanced methodology is proposed against SQL injection disclosure and deterrence by ensuring proper authentication using Heisenberg analysis and password security using Honey pot mechanism.

URLhttps://ieeexplore.ieee.org/document/8076787
DOI10.1109/NETACT.2017.8076787
Citation Keylekshmi_emulation_2017