ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Attack Penetration System for SQL Injection

Journal: International Journal of Advanced Computer Research (IJACR) (Vol.4, No. 15)

Publication Date:

Authors : ; ;

Page : 724-732

Keywords : SQL injection attack; attack detection; attack prevention; Restricted IP.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

The SQL Injection attack is a popular way of attack in terms of document structure and common threats now a day. There are several ways of attack detection as per our study and also prevention methods had been discussed in several research papers. So the main motivation of our paper to penetrate the attack. For this we have proposed an efficient framework from which the central authority can control all the visited IP and restrict those IP. If the IP is in the restricted zone then the contents are restricted by using SQL update command with some status modification states. If the restricted IP wish to access the data from their credentials, it is immediately inform to the admin and the time of attack alert will be stored in the log area of that attack. Finally by comparison we will justify our results which are better in comparison to the previous test and methodology.

Last modified: 2014-12-18 15:05:59