Académique Documents
Professionnel Documents
Culture Documents
(PG scholar, Department of computer science, College of Engineering Munnar, Kerala, India)
2
(Research scholar, Karpagam University, Coimbatore, India)
3
(Pro Vice Chancellor, Kerala Technological University)
ABSTRACT
SQL injection is a technique that exploits a security
vulnerability occurring in the database layer of an
application. The attack takes advantage of poor input
validation in code and website administration. It allows
attackers to obtain unauthorized access to the backend
database to change the intended application generated
SQL queries. Researchers have proposed various
solutions to address SQL injection problems. However,
many of them have limitations and often cannot address
all kind of injection problems. Whats more, new types
of SQL injection attacks have arisen over the years. To
better counter these attacks, identifying and
understanding existing techniques are very important. In
this research we present all SQL injection attack types
and a techniques and tools which can detect or prevent
these attacks by the method of Hashing and Encryption.
Keywords - SQL injection attacks, Web application,
Hashing and Encryption
1. INTRODUCTION
Internet has become one of the most powerful and
interesting tools all across the world. Nowadays there is
a plethora of web applications that cover a wide range of
daily needs. A large number of electronic transactions,
including e-commerce, e-banking, e-voting, e-learning
and e-health among others, can be conducted online at
any time and from anywhere. However, all these Internet
applications are exposed to hacking attempts, securityrelated problems which is a major threat.SQL injection
represents the most common indirect attack technique
against web-powered databases and can effectively
disassemble the secrecy, integrity and availability of web
applications. SQL injection happens when an attacker
inserts malicious SQL code into an SQL query by
manipulating data input into an application. This kind of
vulnerability is a serious threat to any web application
that reads input from users and uses it to build and
execute SQL queries to an underlying database. With
SQL injection, the attacker can run arbitrary SQL
queries, extracting sensitive customer and order
information from e-commerce applications, or can
www.ijsret.org
582
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 4, Issue 5, May 2015
www.ijsret.org
583
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 4, Issue 5, May 2015
This will join the result of the original query with all
the credit card users to the attacker. The proposed
implemented system contains the mechanisms, which
will protect the web application from the above
discussed SQL injection attacks.
3. PROPOSED APPROACH
Working of the proposed technology can be
classified into two:
1. Hashing:
2. Encryption:
In the proposed approach there is a need for one
extra column in database, which contains the EX-OR of
the Hash values of username and password at the time,
when a user account is created for the first time and
stores it in the User table. Whenever user wants to login
to database his/her identity is checked using user name
and password and its hash values. These hash values are
calculated at runtime using store procedure when user
wants to login into the database [9]. During the
www.ijsret.org
584
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 4, Issue 5, May 2015
REFERENCES
[1] Halfond W. G., Viegas, J., and Orso, A., A
Classification
of
SQL-Injection
Attacks
and
Countermeasures. In Proc. of the Intl. Symposium on
Secure Software Engineering, Mar. 2006.
[2] Kemalis, K. and T. Tzouramanis. SQL-IDS: A
Specification-based Approach for SQL injection
Detection. SAC08. Fortaleza, Cear, Brazil, ACM 2008,
pp. 2153-2158.
[3] Dr. M. Amutha Prabakar, M.KarthiKeyan, Prof.K.
Marimuthu, An Efficient Technique for Preventing
www.ijsret.org
585