Protecting Websites from Dissociative Identity SQL Injection Attack- a Patch for Human Folly
Aman Prasad1 , Gangasagar Pitla2 , Satish Patil3 , . Rachana Patil4
Section:Review Paper, Product Type: Conference Paper
Volume-04 ,
Issue-02 , Page no. 27-30, Apr-2016
Online published on May 10, 2016
Copyright © Aman Prasad, Gangasagar Pitla, Satish Patil,. Rachana Patil . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Citation
IEEE Style Citation: Aman Prasad, Gangasagar Pitla, Satish Patil,. Rachana Patil, “Protecting Websites from Dissociative Identity SQL Injection Attack- a Patch for Human Folly,” International Journal of Computer Sciences and Engineering, Vol.04, Issue.02, pp.27-30, 2016.
MLA Citation
MLA Style Citation: Aman Prasad, Gangasagar Pitla, Satish Patil,. Rachana Patil "Protecting Websites from Dissociative Identity SQL Injection Attack- a Patch for Human Folly." International Journal of Computer Sciences and Engineering 04.02 (2016): 27-30.
APA Citation
APA Style Citation: Aman Prasad, Gangasagar Pitla, Satish Patil,. Rachana Patil, (2016). Protecting Websites from Dissociative Identity SQL Injection Attack- a Patch for Human Folly. International Journal of Computer Sciences and Engineering, 04(02), 27-30.
BibTex Citation
BibTex Style Citation:
@article{Prasad_2016,
author = {Aman Prasad, Gangasagar Pitla, Satish Patil,. Rachana Patil},
title = {Protecting Websites from Dissociative Identity SQL Injection Attack- a Patch for Human Folly},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2016},
volume = {04},
Issue = {02},
month = {4},
year = {2016},
issn = {2347-2693},
pages = {27-30},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=46},
publisher = {IJCSE, Indore, INDIA},
}
RIS Citation
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=46
TI - Protecting Websites from Dissociative Identity SQL Injection Attack- a Patch for Human Folly
T2 - International Journal of Computer Sciences and Engineering
AU - Aman Prasad, Gangasagar Pitla, Satish Patil,. Rachana Patil
PY - 2016
DA - 2016/05/10
PB - IJCSE, Indore, INDIA
SP - 27-30
IS - 02
VL - 04
SN - 2347-2693
ER -




Abstract
Injection attack is a method that can inject any kind of malicious string or anomaly string on the original string. Most of the pattern based techniques are used static analysis and patterns are generated from the attacked statements. In this project, we proposed a detection and prevention technique for preventing SQL Injection Attack (SQLIA) using Aho-Corasick pattern matching algorithm. The basic goal of our project is to minimize the web-based attacks like SQL Injection Attack (SQLIA) and reduce the load of server.
Key-Words / Index Term
SQL Injection; SQL Injection Attack; Aho-Corasick Algorithm; Anomaly Scoring
References
[1] Aho, Alfred V.; Margaret J. Corasick (June 1975). "Efficient string matching: An aid to bibliographic search". Communications of the ACM 18 (6): 333–340
[2] Commentz-Walter B. A string matching algorithm fast on the average, Proc. 6th International Colloquium on Automata, Languages, and Programming (1979), pp. 118-132.
[3] Alsmadi I., Nuser M., String Matching Evaluation Methods for DNA Comparisons, International Journal of Advanced Science and Technology, Vol.47, 2012.
[4] Amir A., Lewenstein M., and Porat E., Faster Algorithms for String Matching with K-Mismatches, Journal of Algorithms 50(2004) 257-275.
[5] Gomaa N.H., Fahmy A.A., Short Answer Grading using String Similarity and Corpus-Based Similarity, International Journal of Advanced Computer Science and Applications, Vol 3,No.11, 2012.
[6] https://www.blogs.akamai.com/
[7] C.J. Ezeife, J. Dong, A.K. Aggarwal, “Sensor Web-IDS: A Web Mining Intrusion Detection System”, International Journal of Web Information Systems, volume 4, pp. 97-120, 2007