SlideShare a Scribd company logo
International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July –Aug 2020
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED:All Rights are Reserved Page 25
A Study of Database Protection Techniques
Lakshmi Prasad1
, Bibin Varghese2
,Smita C Thomas3
1
(P G Scholar, Department of Computer Science and Engineering,Mount Zion College of Engineering, Kadammanitta
Email: lakshmiprsd24@gmail.com)
2
(Assistant Professor, Department of CSE, Mount Zion College Of Engineering, Kadammanitta)
3
(Research Scholar, VelsUniversity,Chennai
Email: smitabejoy@gmail.com)
----------------------------------------************************----------------------------------
Abstract:
Database management systems are important to businesses and organizations because they provide
a highly efficient method for handling multiple types of data. Some of the data that are easily managed
with this type of system include: employee records, student information, payroll, accounting, project
management, inventory and library books. These systems are built to be extremely versatile. A database is
a key tool for businesses that can cause serious headaches if breached. There are some serious threats
because of hackers done various attempts to steal the data in the database. Various attacks like Sql
injection and Stored Injection containing Cross site scripting may change the information in the databases
which decreases the truthfulness of the database. This paper, proposes SEPTIC, a mechanism for DBMS
attack prevention, which can also assist on the identification of the vulnerabilities in the applications and
SQLrand which applies the concept of instruction-set randomization to SQL, creating instances of the
language that are unpredictable to the attacker. Queries injected by the attacker will be caught and
terminated by the database parser.
Keywords —SEPTIC; Sql injection; Stored Injection; Cross site scripting;SQLrand
----------------------------------------************************----------------------------------
I. INTRODUCTION
Since the Usage and application of internet
increases, communications and computer network
technology has been rapid development,
especially the emergence of the Internet, makes
the computer used in government, business,
business, education, health care and other areas of
society at an unprecedented rate, which are
profound impact on people's economic, work and
live. Network brings you convenience while
brings more and more malicious attackers. They
target the network database; make the database
information security under serious threat. The
SQL attack is one of common attacks, the tool of
the SQL attack is SQL statements. Attackers
towards programming vulnerability of application
developers, submit wellconstructed SQL
RESEARCH ARTICLE OPEN ACCESS
International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July –Aug 2020
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 26
statement to the server to achieve the goal of
attacking.
SQL injection attacks (SQLI), for example,
continue to rise in number and severity [2].
Commonly used defences are validation functions,
web application firewalls (WAFs), and prepared
statements. The first two inspect web application
inputs and sanitize those that are considered
dangerous, whereas the third bounds inputs to
placeholders in the SQL queries. Other anti-SQLI
mechanisms have been developed but less
adopted. Some of these monitor and block SQL
queries that deviate from specific models, but the
inspection is made without full knowledge about
how they are processed by the DBMS. In all these
cases, developers and system administrators make
assumptions about how the server-side scripting
language and the DBMS work and interact, which
sometimes are simplistic, whereas in others are
blatantly wrong.
For example, programmers usually assume that
the PHP function mysql_real_escape_string
always effectively sanitizes inputs and prevents
SQLI attacks, which is not true. Also, they often
assume that values retrieved from a database do
notneed to be validated before being inserted in a
query, leading to second-order injection
vulnerabilities. This is visible when, for instance,
the code admin’ - - is sanitized by escaping the
prime character before sending it to the database,
but the DBMS unsanitizes it before actually
storing it. Later, the code is retrieved from the
database and used unsanitized in some query,
carrying out the attack.
Such simplistic/wrong assumptions seem to be
caused by a semantic mismatchbetween how an
SQL query is expected to run and what actually
occurs when it is executed (e.g., the programmer
expects it to be sanitized but the DBMS
unsanitized it). This mismatch may lead to
vulnerabilities, as the protectionmechanisms may
be ineffective (e.g., they may miss some attacks).
To avoid this problem, SQLI attacks could be
handled inside, after the server-side code
processes the inputs and the DBMS validates the
queries, reducing the amount of assumptions
that are made. The mismatch and this solution are
not restricted to web applications, meaning that
the same problemcan be present in other business
applications. In fact, injection attacks are a
generic form of attack, transversal to all
applications that use a database as backend.
The paper propose a similar idea for
applications backed by databases. Here propose to
block injection attacks insidethe DBMS at
runtime. The approach is SElf-ProtecTIng
databases from attaCks(SEPTIC). The DBMS is
an interesting location to add protections against
such attacks because it has an unambiguous
knowledge about what will be considered as
clauses, predicates, and expressions of an SQL
statement. No mechanism that actuates outside of
the DBMS has such knowledge.
Here address two categories of database attacks:
SQL injection attacks, which continue to be
among those with highest riskand for which new
variants continue to appear; and stored injection
attacks, including stored cross-site scripting,
whichalso involve SQL queries. For SQLI, here
propose to catch theattacks by comparing queries
with query models, improving anidea that has
been previously used only outside of the DBMS
and by comparing queries with validated queries
with a similarity method, improving detection
accuracy.For stored injection, here employ
plugins to deal with specificattacks before data
are inserted in the database. SEPTIC relies on two
new concepts. Before detecting attacks,the
mechanism can be trained by forcing calls to all
queries inan application. The result is a set of
query models. However,as training may be
incomplete and not cover all queries,
hereintroduce the notion of putting in quarantine
queries at runtimefor which SEPTIC has no query
model. The second concept,aging, deals with
updates to query models after a new releaseof an
application, something that is inevitable in real
worldsoftware. Both concepts allow a reduction
of the false negative (attacks not detected) and
false positive (alerts for nonattacks) rates.
Another technique which introduce the concept of
instruction-set randomization for safeguarding
systems against any type of code-injection attack,
International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July –Aug 2020
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 27
by creating process-specific randomized
instruction sets (e.g., machine instructions) of the
system executing potentially vulnerable software.
An attacker that does not know the key to the
randomization algorithm will inject code that is
invalid for that randomized processor (and
process), causing a runtime exception.
Here applies the same technique to the problem
of SQL injection attacks: create randomized
instances of the SQL query language, by
randomizing the template queryinside the CGI
script and the database parser. To allow for easy
retrofitting of the solutionto existing systems,
introduce a de-randomizing proxy, which converts
randomized queries to proper SQL queries for the
database. Code injected by the rogue client
evaluates to undefined keywords and expressions.
When this is the outcome, then standard keywords
(e.g., “or”) lose their significance, and attacks are
frustrated before they can even commence. The
performance overhead of our approach is minimal,
adding up to 6.5ms to query processing time.
II. LITERATURE SURVEY
There is a vast corpus of research in web
application security, so Here survey only related
runtime protection mechanisms, which is the
category in which SEPTIC fits. All the works
Here describe have a point in common that
makes them quite different from this paper: their
focus is on how to do detection or protection.
On the contrary, this paper is more concerned
with an architectural problem: how to do
detection/protection inside the DBMS, so that it
runs out of thebox when the DBMS is started.
None of the related works doesdetection inside
the DBMS.
Buehrer et al. present a similar scheme that
manages to detect mimicry attacks by enriching
the models (parse trees) with comment tokens.
However, their scheme cannot deal with most
attacks related with the semantic mismatch
problem. SqlCheck is another scheme that
compares parse trees to detect attacks. SqlCheck
detects some of the attacks related with semantic
mismatch, but not those involving encoding and
evasion. Again, both these mechanisms involve
modifying the application code, unlike SEPTIC.
DIGLOSSIA is a technique to detect SQLI
attacks that was implemented as an extension of
the PHP interpreter. The technique first obtains
the query models by mapping all query
statements’ characters to shadow characters
except user inputs, and computes shadow values
for all string user inputs. Second, for a query
execution, it computes the query and verifies if
the root nodes from the two parsed trees are
equal. Like SEPTIC, DIGLOSSIA detects
syntax structure and mimicry attacks but, unlike
SEPTIC, it neither detects second-order SQLI
once it only computes queries with user inputs,
nor encoding and evasion space characters
attacks as these attacks do not alter the parse tree
root nodes before the malicious user inputs are
processed by the DBMS. Although better than
AMNESIA and CANDID, it does not deal with
all semantic mismatch problems. Works based
on anomaly intrusion detection systems also aim
to detect SQLI attacks by comparing models
with queries sent by web applications.
Valeuret al. present one of these works. The
system also undergoes a training phase to create
models (a set of profiles) of normal access to the
database. In runtime, it detects deviations from
that model. SQL-IDS is another system that
compares queries against query specifications that
define the query syntactic structure (a kind of
model) implemented in the application. However,
there is no information about how such
specifications are created, despite the authors
arguing that their source code does not need
instrumentation.
SQLProb is a proxy-based system that also
uses models previously extracted by a specific
data collection phase. Afterward, the system
evaluates the queries produced by applications,
parsing them, and extracting their user inputs,
then validates the inputs against the parse tree,
resorting to an input repository. For web services,
Laranjeiroet al. propose a similar approach to
discover SQL and XPath injection attacks. In a
first phase, their approach learns regular requests
International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July –Aug 2020
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 28
by representing them into invariant statements (a
kind of models), and later protects web services
by matching incoming requests with those
collected in the learning phase. Moreover, the
approach uses heuristics to deal with incoming
requests that the approach does not learn as
invariant. All these systems, like the previously
mentioned tools, are external to the DBMS, so
they do not use our approach to deal with the
semantic mismatch problem. Machine-learning
approaches for detection SQLI have been
emerging. idMAS-SQL is one of these works.
SOFIA also uses machine learning to classify
queries issued by applications, resorting to a
clustering algorithm. The tool has a training phase
to get the parse tree from legitimate queries and to
create clusters with these trees. Afterward, in
evaluating phase it classifies as attack the queries
that do not fit any cluster. Dynamic taint analysis
tracks the flow of user inputs in the application
and verifies it they reach dangerous instructions.
Xu et al. show how this technique can be used to
detect SQLI and reflected XSS. They annotate the
arguments from source functions and sensitive
sinks as untrusted and instrument the source code
to track the user inputs to verify if they reach the
untrusted arguments of sensitive sinks (e.g.,
functions that send queries to the database).
ARDILLA creates attack vectors that contain
mutations of user inputs generated previously, and
then deploys such vectors, tracking the inputs and
verifying if they exploit SQLI and XSS
vulnerabilities. A different but related idea is
implemented by CSSE that protects PHP
applications from SQLI, XSS, and OSCI by
modifying the platform to distinguish between
what is part of the program and what is external
(input), defining checks to be performed to the
latter (e.g., if the query structure becomes
different due to inputs). WASP does something
similar to block SQLI attacks. SEPTIC does not
track inputs in the application, but runs in the
DBMS.
Recently, Ahuja et al. [1] and Masri and
Sleiman presented two works about prevention of
SQLI attacks. The first presents a tool called
SQLPIL that simply transforms SQL queries
created as strings into prepared statements,
preventing SQLI in the source code. The second
presents three new approaches to detect and
prevent SQLI attacks based on rewriting queries,
encoding queries, and adding assertions to the
code.
Here propose three new directions to detect
and prevent SQLIA, as an alternative solution.
These are (i) Query Rewriting-based approach, (ii)
Encoding-based approach, and (iii) Assertion-
based approach. The main objective of first
approach is to mitigate the effect of concatenation
operation during query generation. The objective
of the second approach is to mitigate the mal-
effect of bad input on query semantics. The
assertion-based technique is a state verification
technique which can be performed either at
application level or at database level. Here
provide a comparative study among our proposed
approaches based on security guaranty, usability
and applicative point of view.
III. PROPOSED METHOD
SEPTIC Approach
SEPTIC is implemented by a module inside the
DBMS, allowing every query to be checked for
attacks. The semantic mismatch problem is
circumvented because queries are evaluated for
detection purposes near the end of the DBMS data
flow, just before the query is executed. As
SEPTIC is inside the DBMS, it is independent
from the application (e.g., from the application
programming language) and the way it builds
queries (e.g., dynamically). This lets SEPTIC
analyse queries issued by any kind of application.
However, with support from the application,
SEPTIC can also contribute to the identification
of the vulnerabilities that are being exploited.
Approach Overview
Figure 1 shows the architecture of a web and a
non-Web application with a backend database.
When the system starts, SEPTIC may undergo a
training phase in order to obtain the query models
for the application. Here designates administrator,
the person or persons in charge of managing the
International Journal of Scientific Research and Engineering Development
©IJSRED: All Rights are Reserved
DBMS and SEPTIC (e.g., decides when the
training mode ends). Later on, when SEPTIC is
put in normal operation, it works basically in the
following way.
1) An application requests the execution of a
query. Optionally, the query instruction may
contain an (external) identifier produced by the
server-side language engine (SSLE)
or the application.
2) The DBMS receives, parses, and validates the
query. Before it executes the query, SEPTIC is
called to retrieve its associated quer
which is used to detect and block a potential
incoming attack. If an external identifier arrives
with the query, it is extracted to get context
information about the places in the source code of
the application where the query was built. This
information can be helpful to locate a
vulnerability in case an attack is found.
SQLRAND Architecture
Injecting SQL code into a web application
requires little effort by those who understand
both the semantics of the SQL language and CGI
scripts. Numerous applicationstake user input and
feed it into a pre-defined query. The query is then
handed tothe database for execution. Unless
developers properly design their application
codeto protect against unexpected data input by
users, alteration to the database
structure,corruption of data or revelation of
private and confidential information may be
grantedinadvertently.
For example, consider a login page of a CGI
application that expects a user-nameand the
corresponding password. When the credentials are
International Journal of Scientific Research and Engineering Development-– Volume 3 Issue
Available at www.ijsred.com
©IJSRED: All Rights are Reserved
DBMS and SEPTIC (e.g., decides when the
training mode ends). Later on, when SEPTIC is
put in normal operation, it works basically in the
1) An application requests the execution of a
ry instruction may
contain an (external) identifier produced by the
2) The DBMS receives, parses, and validates the
query. Before it executes the query, SEPTIC is
called to retrieve its associated query model,
which is used to detect and block a potential
incoming attack. If an external identifier arrives
with the query, it is extracted to get context
information about the places in the source code of
the application where the query was built. This
rmation can be helpful to locate a
vulnerability in case an attack is found.
Injecting SQL code into a web application
requires little effort by those who understand
both the semantics of the SQL language and CGI
pplicationstake user input and
defined query. The query is then
handed tothe database for execution. Unless
developers properly design their application
codeto protect against unexpected data input by
users, alteration to the database
ructure,corruption of data or revelation of
private and confidential information may be
For example, consider a login page of a CGI
nameand the
corresponding password. When the credentials are
submitted, they are insertedwithin a query
template such as the following:
"select * from mysql.userwhere username=’ " .
$uid ." ’ andpassword=password(’ ". $pwd . " ’);"
Instead of a valid user-name, the malicious user
sets the $uid variable to the string
causing the CGI script to issue the following SQL
query to the database:
"select * from mysql.userwhere username=’’ or
1=1; - -’’ andpassword=password(’_any_text_’);"
Notice that the single quotes balance the quotes in
the pre-defined query, and thedouble hyphen
comments out the remainder of the SQL query.
Therefore, the passwordvalue is irrelevant and
may be set to any character string. The result set
of the querycontains at least one record, since the
“where” clause evaluates to true. If
applicationidentifies a valid user by testing
whether the result set is non-
canbypass the security check.
The solution extends the application of
Instruction-Set Randomization to theSQL
language: the SQL standard keywords are
manipulated by appending a randominteger to
them, one that an attacker cannot easily guess.
Therefore, any malicious userattempting an SQL
injection attack would be thwarted, for the user
input inserted intothe “randomized” query would
always be classified as a set of non
resultingin an invalid expression.Essentially, the
structured query language has taken on new
keywords that will notbe recognized by the
database’s SQL interpreter. A difficult approach
would be to modifythe database’s interpreter to
accept the new set of keywords. However,
attempting tochange its behaviour would be a
daunting task. Furthermore, a modified database
wouldrequire all applications submitting
SQLqueries to conform to its new language.
Althoughdedicating the database server
selected applications might be possible,
therandom key would not be varied among the
SQL applications using it. Ideally, havingthe
ability to vary the random SQL key, while
maintaining one database system, grantsa greater
level of security, by making it difficult to subvert
multiple applications bysuccessfully attacking the
Volume 3 Issue 4, July –Aug 2020
www.ijsred.com
Page 29
submitted, they are insertedwithin a query
template such as the following:
"select * from mysql.userwhere username=’ " .
$uid ." ’ andpassword=password(’ ". $pwd . " ’);"
name, the malicious user
sets the $uid variable to the string:’ or 1=1; - -’,
causing the CGI script to issue the following SQL
"select * from mysql.userwhere username=’’ or
’’ andpassword=password(’_any_text_’);"
Notice that the single quotes balance the quotes in
y, and thedouble hyphen
comments out the remainder of the SQL query.
Therefore, the passwordvalue is irrelevant and
may be set to any character string. The result set
of the querycontains at least one record, since the
“where” clause evaluates to true. If the
applicationidentifies a valid user by testing
-empty, the attacker
solution extends the application of
Set Randomization to theSQL
language: the SQL standard keywords are
lated by appending a randominteger to
them, one that an attacker cannot easily guess.
Therefore, any malicious userattempting an SQL
injection attack would be thwarted, for the user
input inserted intothe “randomized” query would
set of non-keywords,
resultingin an invalid expression.Essentially, the
structured query language has taken on new
keywords that will notbe recognized by the
database’s SQL interpreter. A difficult approach
would be to modifythe database’s interpreter to
ccept the new set of keywords. However,
attempting tochange its behaviour would be a
daunting task. Furthermore, a modified database
wouldrequire all applications submitting
SQLqueries to conform to its new language.
Althoughdedicating the database server for
selected applications might be possible,
therandom key would not be varied among the
SQL applications using it. Ideally, havingthe
ability to vary the random SQL key, while
maintaining one database system, grantsa greater
t difficult to subvert
multiple applications bysuccessfully attacking the
International Journal of Scientific Research and Engineering Development
©IJSRED: All Rights are Reserved
least protected one.The design consists of a proxy
that sitsbetween the client and database server
(seeFigure 2).
Note that the proxy may be on a separate
machine, unlike the figure’s depiction.By
moving the de-randomization process outside
the DBMS to the proxy, gains in flexibility,
simplicity, and security. Multiple proxiesusing
unique random keys to decode SQL commands
can be listening for connectionson behalf of the
same database, yet allowing disparate SQL
applications to communicatein their own
“tongue.” The interpreter is no longer bound to
the internals ofthe DBMS. The proxy’s primary
obligation is to decipher the random SQL query
andthen forward the SQL command with th
standard set of keywords to the database
forcomputation. Another benefit of the proxy is
the concealment of database errors whichmay
unveil the random SQL keyword extension to
the user. A typical attack consists ofa simple
injection of SQL, hoping that the error message
will disclose a subset of thequery or table
information, which may be used to deduce
intuitively hidden propertiesof the database. By
stripping away the randomization tags in the
proxy, we need notworry about the DBMS
inadvertently exposing such information
through error messages;the DBMS itself never
sees the randomization tags. Thus, to ensure the
securityof the scheme, we only need to ensure
that no messages generated by the proxy
itselfare ever sent to the DBMS or the front
International Journal of Scientific Research and Engineering Development-– Volume 3 Issue
Available at www.ijsred.com
©IJSRED: All Rights are Reserved
design consists of a proxy
that sitsbetween the client and database server
Note that the proxy may be on a separate
figure’s depiction.By
randomization process outside
in flexibility,
simplicity, and security. Multiple proxiesusing
unique random keys to decode SQL commands
can be listening for connectionson behalf of the
atabase, yet allowing disparate SQL
applications to communicatein their own
“tongue.” The interpreter is no longer bound to
the internals ofthe DBMS. The proxy’s primary
obligation is to decipher the random SQL query
andthen forward the SQL command with the
standard set of keywords to the database
forcomputation. Another benefit of the proxy is
the concealment of database errors whichmay
unveil the random SQL keyword extension to
the user. A typical attack consists ofa simple
he error message
will disclose a subset of thequery or table
information, which may be used to deduce
intuitively hidden propertiesof the database. By
stripping away the randomization tags in the
proxy, we need notworry about the DBMS
g such information
through error messages;the DBMS itself never
sees the randomization tags. Thus, to ensure the
securityof the scheme, we only need to ensure
that no messages generated by the proxy
itselfare ever sent to the DBMS or the front-end
server. Given that the proxy itself isfairly
simple, it seems possible to secure it against
attacks. In the event that the proxyis
compromised, the database remains safe,
assuming that other security measures arein
place.
IV. CONCLUSION
This paper explored two forms
attacks against web and businessapplication
databases. It presented the idea of catching attacks
inside the DBMS, letting it protected from SQLI
and stored injection attacks. Moreover, by putting
protection inside the DBMS,
is possible to detect and block sophisticated
attacks, including those related with the semantic
mismatch problem. As a second idea, it presented
a form of identifying vulnerabilities in application
code, when attacks were detected. This paper also
presented SEPTIC, a mechanism implemented
inside MySQL and SQLrand, a system for
preventing SQL injection attacks against
webservers. The main intuition is that by using a
randomized SQL query language, specificto a
particular CGI application, it is possi
and abort queries that include injectedcode. By
using a proxy for the de-randomization process,
we achieve portabilityand security gains: the same
proxy can be used with various DBMS back
and itcan ensure that no information that would
expose the randomization process can leakfrom
the database itself.
REFERENCES
[1]. B. Ahuja, A. Jana, A. Swarnkar, and R. Halder, “On preventing SQL
injection attacks”, Adv. Comput. Syst. Secur.
[2]. S. Bandhakavi, P. Bisht, P. Madhusudan, and V. N. Venkatakrishnan,
“CANDID: Preventing SQL injection attacks using dynamic candidate
evaluations”, in Proc. 14th ACM Conf. Comput. Commun. Secur.
12–24, Oct. 2007.
[3]. Berman, V. Bourassa, and E. Selberg. TRON: Process
Protection for the UNIX Operating System. In
USENIX Technical Conference, Jan. 1995.
[4]. S. Bhatkar, D. C. DuVarney, and R. Sekar. Address Obfuscation: an
Efficient Approach to Combat a Broad Range of Memory Error Exploits.
In Proceedings of the 12th USENIXSecurity Symposium
Aug. 2003.
Volume 3 Issue 4, July –Aug 2020
www.ijsred.com
Page 30
Given that the proxy itself isfairly
simple, it seems possible to secure it against
attacks. In the event that the proxyis
compromised, the database remains safe,
assuming that other security measures arein
This paper explored two forms of protection from
attacks against web and businessapplication
databases. It presented the idea of catching attacks
protected from SQLI
and stored injection attacks. Moreover, by putting
protection inside the DBMS, here showed that it
is possible to detect and block sophisticated
attacks, including those related with the semantic
mismatch problem. As a second idea, it presented
a form of identifying vulnerabilities in application
code, when attacks were detected. This paper also
presented SEPTIC, a mechanism implemented
inside MySQL and SQLrand, a system for
preventing SQL injection attacks against
webservers. The main intuition is that by using a
randomized SQL query language, specificto a
particular CGI application, it is possible to detect
and abort queries that include injectedcode. By
randomization process,
we achieve portabilityand security gains: the same
proxy can be used with various DBMS back-end,
and itcan ensure that no information that would
xpose the randomization process can leakfrom
B. Ahuja, A. Jana, A. Swarnkar, and R. Halder, “On preventing SQL
Adv. Comput. Syst. Secur. vol. 395, pp. 49–64, 2015.
, P. Bisht, P. Madhusudan, and V. N. Venkatakrishnan,
“CANDID: Preventing SQL injection attacks using dynamic candidate
Proc. 14th ACM Conf. Comput. Commun. Secur., pp.
Berman, V. Bourassa, and E. Selberg. TRON: Process-Specific File
Protection for the UNIX Operating System. In Proceedings of the
S. Bhatkar, D. C. DuVarney, and R. Sekar. Address Obfuscation: an
Efficient Approach to Combat a Broad Range of Memory Error Exploits.
Security Symposium, pp. 105–120,

More Related Content

What's hot

Software security risk mitigation using object oriented design patterns
Software security risk mitigation using object oriented design patternsSoftware security risk mitigation using object oriented design patterns
Software security risk mitigation using object oriented design patterns
eSAT Journals
 
Software security risk mitigation using object
Software security risk mitigation using objectSoftware security risk mitigation using object
Software security risk mitigation using object
eSAT Publishing House
 
SECURING SOFTWARE DEVELOPMENT STAGES USING ASPECT-ORIENTATION CONCEPTS
SECURING SOFTWARE DEVELOPMENT STAGES USING ASPECT-ORIENTATION CONCEPTSSECURING SOFTWARE DEVELOPMENT STAGES USING ASPECT-ORIENTATION CONCEPTS
SECURING SOFTWARE DEVELOPMENT STAGES USING ASPECT-ORIENTATION CONCEPTS
ijseajournal
 
Survey mobile app
Survey mobile appSurvey mobile app
Survey mobile app
eSAT Journals
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniques
eSAT Journals
 
Predictive cyber security
Predictive cyber securityPredictive cyber security
Predictive cyber security
csandit
 
Cis 333 Enthusiastic Study / snaptutorial.com
Cis 333 Enthusiastic Study / snaptutorial.comCis 333 Enthusiastic Study / snaptutorial.com
Cis 333 Enthusiastic Study / snaptutorial.com
GeorgeDixon99
 
A model based security requirements engineering framework
A model based security requirements engineering frameworkA model based security requirements engineering framework
A model based security requirements engineering framework
iaemedu
 
A model based security requirements engineering framework
A model based security requirements engineering frameworkA model based security requirements engineering framework
A model based security requirements engineering framework
IAEME Publication
 
Model based vulnerability testing report
Model based vulnerability testing reportModel based vulnerability testing report
Model based vulnerability testing report
Kupili Archana
 
A Security Analysis Framework Powered by an Expert System
A Security Analysis Framework Powered by an Expert SystemA Security Analysis Framework Powered by an Expert System
A Security Analysis Framework Powered by an Expert System
CSCJournals
 
Se project-methodology-for-security-project-web
Se project-methodology-for-security-project-webSe project-methodology-for-security-project-web
Se project-methodology-for-security-project-web
Sandeep Sharma IIMK Smart City,IoT,Bigdata,Cloud,BI,DW
 
Developing secure software using Aspect oriented programming
Developing secure software using Aspect oriented programmingDeveloping secure software using Aspect oriented programming
Developing secure software using Aspect oriented programming
IOSR Journals
 
Cst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.comCst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.com
amaranthbeg53
 
Vulnerability scanners a proactive approach to assess web application security
Vulnerability scanners a proactive approach to assess web application securityVulnerability scanners a proactive approach to assess web application security
Vulnerability scanners a proactive approach to assess web application security
ijcsa
 

What's hot (15)

Software security risk mitigation using object oriented design patterns
Software security risk mitigation using object oriented design patternsSoftware security risk mitigation using object oriented design patterns
Software security risk mitigation using object oriented design patterns
 
Software security risk mitigation using object
Software security risk mitigation using objectSoftware security risk mitigation using object
Software security risk mitigation using object
 
SECURING SOFTWARE DEVELOPMENT STAGES USING ASPECT-ORIENTATION CONCEPTS
SECURING SOFTWARE DEVELOPMENT STAGES USING ASPECT-ORIENTATION CONCEPTSSECURING SOFTWARE DEVELOPMENT STAGES USING ASPECT-ORIENTATION CONCEPTS
SECURING SOFTWARE DEVELOPMENT STAGES USING ASPECT-ORIENTATION CONCEPTS
 
Survey mobile app
Survey mobile appSurvey mobile app
Survey mobile app
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniques
 
Predictive cyber security
Predictive cyber securityPredictive cyber security
Predictive cyber security
 
Cis 333 Enthusiastic Study / snaptutorial.com
Cis 333 Enthusiastic Study / snaptutorial.comCis 333 Enthusiastic Study / snaptutorial.com
Cis 333 Enthusiastic Study / snaptutorial.com
 
A model based security requirements engineering framework
A model based security requirements engineering frameworkA model based security requirements engineering framework
A model based security requirements engineering framework
 
A model based security requirements engineering framework
A model based security requirements engineering frameworkA model based security requirements engineering framework
A model based security requirements engineering framework
 
Model based vulnerability testing report
Model based vulnerability testing reportModel based vulnerability testing report
Model based vulnerability testing report
 
A Security Analysis Framework Powered by an Expert System
A Security Analysis Framework Powered by an Expert SystemA Security Analysis Framework Powered by an Expert System
A Security Analysis Framework Powered by an Expert System
 
Se project-methodology-for-security-project-web
Se project-methodology-for-security-project-webSe project-methodology-for-security-project-web
Se project-methodology-for-security-project-web
 
Developing secure software using Aspect oriented programming
Developing secure software using Aspect oriented programmingDeveloping secure software using Aspect oriented programming
Developing secure software using Aspect oriented programming
 
Cst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.comCst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.com
 
Vulnerability scanners a proactive approach to assess web application security
Vulnerability scanners a proactive approach to assess web application securityVulnerability scanners a proactive approach to assess web application security
Vulnerability scanners a proactive approach to assess web application security
 

Similar to A Study of Database Protection Techniques

Prevention of SQL injection in E- Commerce
Prevention of SQL injection in E- CommercePrevention of SQL injection in E- Commerce
Prevention of SQL injection in E- Commerce
ijceronline
 
Prevention of SQL Injection Attacks having XML Database
Prevention of SQL Injection Attacks having XML DatabasePrevention of SQL Injection Attacks having XML Database
Prevention of SQL Injection Attacks having XML Database
IOSR Journals
 
Vulnerability Management System
Vulnerability Management SystemVulnerability Management System
Vulnerability Management System
IRJET Journal
 
A Study on Detection and Prevention of SQL Injection Attack
A Study on Detection and Prevention of SQL Injection AttackA Study on Detection and Prevention of SQL Injection Attack
A Study on Detection and Prevention of SQL Injection Attack
IRJET Journal
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
theijes
 
Devoid Web Application From SQL Injection Attack
Devoid Web Application From SQL Injection AttackDevoid Web Application From SQL Injection Attack
Devoid Web Application From SQL Injection Attack
IJRESJOURNAL
 
Ijeee 51-57-preventing sql injection attacks in web application
Ijeee 51-57-preventing sql injection attacks in web applicationIjeee 51-57-preventing sql injection attacks in web application
Ijeee 51-57-preventing sql injection attacks in web application
Kumar Goud
 
A Study on Vulnerability Management
A Study on Vulnerability ManagementA Study on Vulnerability Management
A Study on Vulnerability Management
IRJET Journal
 
Literature Survey on Web based Recognition of SQL Injection Attacks
Literature Survey on Web based Recognition of SQL Injection AttacksLiterature Survey on Web based Recognition of SQL Injection Attacks
Literature Survey on Web based Recognition of SQL Injection Attacks
IRJET Journal
 
Ijcatr04041018
Ijcatr04041018Ijcatr04041018
Ijcatr04041018
Editor IJCATR
 
A hybrid technique for sql injection attacks detection and prevention
A hybrid technique for sql injection attacks detection and preventionA hybrid technique for sql injection attacks detection and prevention
A hybrid technique for sql injection attacks detection and prevention
ijdms
 
Effective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaSEffective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaS
IRJET Journal
 
Vulnerability Management in IT Infrastructure
Vulnerability Management in IT InfrastructureVulnerability Management in IT Infrastructure
Vulnerability Management in IT Infrastructure
IRJET Journal
 
Paper4
Paper4Paper4
Paper4
Kestone
 
Routine Detection Of Web Application Defence Flaws
Routine Detection Of Web Application Defence FlawsRoutine Detection Of Web Application Defence Flaws
Routine Detection Of Web Application Defence Flaws
IJTET Journal
 
A hybrid framework for detecting structured query language injection attacks...
A hybrid framework for detecting structured query language  injection attacks...A hybrid framework for detecting structured query language  injection attacks...
A hybrid framework for detecting structured query language injection attacks...
IJECEIAES
 
A26001006
A26001006A26001006
A26001006
IJERA Editor
 
Only Abstract
Only AbstractOnly Abstract
Only Abstract
guesta67d4a
 
A Review paper on Securing PHP based websites From Web Application Vulnerabil...
A Review paper on Securing PHP based websites From Web Application Vulnerabil...A Review paper on Securing PHP based websites From Web Application Vulnerabil...
A Review paper on Securing PHP based websites From Web Application Vulnerabil...
Editor IJMTER
 
PREDICTIVE CYBER SECURITY ANALYTICS FRAMEWORK: A NONHOMOGENOUS MARKOV MODEL F...
PREDICTIVE CYBER SECURITY ANALYTICS FRAMEWORK: A NONHOMOGENOUS MARKOV MODEL F...PREDICTIVE CYBER SECURITY ANALYTICS FRAMEWORK: A NONHOMOGENOUS MARKOV MODEL F...
PREDICTIVE CYBER SECURITY ANALYTICS FRAMEWORK: A NONHOMOGENOUS MARKOV MODEL F...
cscpconf
 

Similar to A Study of Database Protection Techniques (20)

Prevention of SQL injection in E- Commerce
Prevention of SQL injection in E- CommercePrevention of SQL injection in E- Commerce
Prevention of SQL injection in E- Commerce
 
Prevention of SQL Injection Attacks having XML Database
Prevention of SQL Injection Attacks having XML DatabasePrevention of SQL Injection Attacks having XML Database
Prevention of SQL Injection Attacks having XML Database
 
Vulnerability Management System
Vulnerability Management SystemVulnerability Management System
Vulnerability Management System
 
A Study on Detection and Prevention of SQL Injection Attack
A Study on Detection and Prevention of SQL Injection AttackA Study on Detection and Prevention of SQL Injection Attack
A Study on Detection and Prevention of SQL Injection Attack
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
Devoid Web Application From SQL Injection Attack
Devoid Web Application From SQL Injection AttackDevoid Web Application From SQL Injection Attack
Devoid Web Application From SQL Injection Attack
 
Ijeee 51-57-preventing sql injection attacks in web application
Ijeee 51-57-preventing sql injection attacks in web applicationIjeee 51-57-preventing sql injection attacks in web application
Ijeee 51-57-preventing sql injection attacks in web application
 
A Study on Vulnerability Management
A Study on Vulnerability ManagementA Study on Vulnerability Management
A Study on Vulnerability Management
 
Literature Survey on Web based Recognition of SQL Injection Attacks
Literature Survey on Web based Recognition of SQL Injection AttacksLiterature Survey on Web based Recognition of SQL Injection Attacks
Literature Survey on Web based Recognition of SQL Injection Attacks
 
Ijcatr04041018
Ijcatr04041018Ijcatr04041018
Ijcatr04041018
 
A hybrid technique for sql injection attacks detection and prevention
A hybrid technique for sql injection attacks detection and preventionA hybrid technique for sql injection attacks detection and prevention
A hybrid technique for sql injection attacks detection and prevention
 
Effective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaSEffective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaS
 
Vulnerability Management in IT Infrastructure
Vulnerability Management in IT InfrastructureVulnerability Management in IT Infrastructure
Vulnerability Management in IT Infrastructure
 
Paper4
Paper4Paper4
Paper4
 
Routine Detection Of Web Application Defence Flaws
Routine Detection Of Web Application Defence FlawsRoutine Detection Of Web Application Defence Flaws
Routine Detection Of Web Application Defence Flaws
 
A hybrid framework for detecting structured query language injection attacks...
A hybrid framework for detecting structured query language  injection attacks...A hybrid framework for detecting structured query language  injection attacks...
A hybrid framework for detecting structured query language injection attacks...
 
A26001006
A26001006A26001006
A26001006
 
Only Abstract
Only AbstractOnly Abstract
Only Abstract
 
A Review paper on Securing PHP based websites From Web Application Vulnerabil...
A Review paper on Securing PHP based websites From Web Application Vulnerabil...A Review paper on Securing PHP based websites From Web Application Vulnerabil...
A Review paper on Securing PHP based websites From Web Application Vulnerabil...
 
PREDICTIVE CYBER SECURITY ANALYTICS FRAMEWORK: A NONHOMOGENOUS MARKOV MODEL F...
PREDICTIVE CYBER SECURITY ANALYTICS FRAMEWORK: A NONHOMOGENOUS MARKOV MODEL F...PREDICTIVE CYBER SECURITY ANALYTICS FRAMEWORK: A NONHOMOGENOUS MARKOV MODEL F...
PREDICTIVE CYBER SECURITY ANALYTICS FRAMEWORK: A NONHOMOGENOUS MARKOV MODEL F...
 

More from IJSRED

IJSRED-V3I6P13
IJSRED-V3I6P13IJSRED-V3I6P13
IJSRED-V3I6P13
IJSRED
 
School Bus Tracking and Security System
School Bus Tracking and Security SystemSchool Bus Tracking and Security System
School Bus Tracking and Security System
IJSRED
 
BigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunityBigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunity
IJSRED
 
Quantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf DiseaseQuantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf Disease
IJSRED
 
DC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric VehiclesDC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric Vehicles
IJSRED
 
Growth Path Followed by France
Growth Path Followed by FranceGrowth Path Followed by France
Growth Path Followed by France
IJSRED
 
Acquisition System
Acquisition SystemAcquisition System
Acquisition System
IJSRED
 
Parallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MPParallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MP
IJSRED
 
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. AmaraStudy of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
IJSRED
 
Understanding Architecture of Internet of Things
Understanding Architecture of Internet of ThingsUnderstanding Architecture of Internet of Things
Understanding Architecture of Internet of Things
IJSRED
 
Smart shopping cart
Smart shopping cartSmart shopping cart
Smart shopping cart
IJSRED
 
An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...
IJSRED
 
Smart Canteen Management
Smart Canteen ManagementSmart Canteen Management
Smart Canteen Management
IJSRED
 
Gandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic EthicsGandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic Ethics
IJSRED
 
Impacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric SolutionImpacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric Solution
IJSRED
 
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
IJSRED
 
Inginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition SystemInginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition System
IJSRED
 
Farmer's Analytical assistant
Farmer's Analytical assistantFarmer's Analytical assistant
Farmer's Analytical assistant
IJSRED
 
Functions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in IndiaFunctions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in India
IJSRED
 
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
IJSRED
 

More from IJSRED (20)

IJSRED-V3I6P13
IJSRED-V3I6P13IJSRED-V3I6P13
IJSRED-V3I6P13
 
School Bus Tracking and Security System
School Bus Tracking and Security SystemSchool Bus Tracking and Security System
School Bus Tracking and Security System
 
BigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunityBigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunity
 
Quantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf DiseaseQuantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf Disease
 
DC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric VehiclesDC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric Vehicles
 
Growth Path Followed by France
Growth Path Followed by FranceGrowth Path Followed by France
Growth Path Followed by France
 
Acquisition System
Acquisition SystemAcquisition System
Acquisition System
 
Parallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MPParallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MP
 
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. AmaraStudy of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
 
Understanding Architecture of Internet of Things
Understanding Architecture of Internet of ThingsUnderstanding Architecture of Internet of Things
Understanding Architecture of Internet of Things
 
Smart shopping cart
Smart shopping cartSmart shopping cart
Smart shopping cart
 
An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...
 
Smart Canteen Management
Smart Canteen ManagementSmart Canteen Management
Smart Canteen Management
 
Gandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic EthicsGandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic Ethics
 
Impacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric SolutionImpacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric Solution
 
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
 
Inginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition SystemInginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition System
 
Farmer's Analytical assistant
Farmer's Analytical assistantFarmer's Analytical assistant
Farmer's Analytical assistant
 
Functions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in IndiaFunctions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in India
 
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
 

Recently uploaded

basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
abbyasa1014
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
RadiNasr
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball playEric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
enizeyimana36
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
sachin chaurasia
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 

Recently uploaded (20)

basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball playEric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 

A Study of Database Protection Techniques

  • 1. International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July –Aug 2020 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED:All Rights are Reserved Page 25 A Study of Database Protection Techniques Lakshmi Prasad1 , Bibin Varghese2 ,Smita C Thomas3 1 (P G Scholar, Department of Computer Science and Engineering,Mount Zion College of Engineering, Kadammanitta Email: lakshmiprsd24@gmail.com) 2 (Assistant Professor, Department of CSE, Mount Zion College Of Engineering, Kadammanitta) 3 (Research Scholar, VelsUniversity,Chennai Email: smitabejoy@gmail.com) ----------------------------------------************************---------------------------------- Abstract: Database management systems are important to businesses and organizations because they provide a highly efficient method for handling multiple types of data. Some of the data that are easily managed with this type of system include: employee records, student information, payroll, accounting, project management, inventory and library books. These systems are built to be extremely versatile. A database is a key tool for businesses that can cause serious headaches if breached. There are some serious threats because of hackers done various attempts to steal the data in the database. Various attacks like Sql injection and Stored Injection containing Cross site scripting may change the information in the databases which decreases the truthfulness of the database. This paper, proposes SEPTIC, a mechanism for DBMS attack prevention, which can also assist on the identification of the vulnerabilities in the applications and SQLrand which applies the concept of instruction-set randomization to SQL, creating instances of the language that are unpredictable to the attacker. Queries injected by the attacker will be caught and terminated by the database parser. Keywords —SEPTIC; Sql injection; Stored Injection; Cross site scripting;SQLrand ----------------------------------------************************---------------------------------- I. INTRODUCTION Since the Usage and application of internet increases, communications and computer network technology has been rapid development, especially the emergence of the Internet, makes the computer used in government, business, business, education, health care and other areas of society at an unprecedented rate, which are profound impact on people's economic, work and live. Network brings you convenience while brings more and more malicious attackers. They target the network database; make the database information security under serious threat. The SQL attack is one of common attacks, the tool of the SQL attack is SQL statements. Attackers towards programming vulnerability of application developers, submit wellconstructed SQL RESEARCH ARTICLE OPEN ACCESS
  • 2. International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July –Aug 2020 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 26 statement to the server to achieve the goal of attacking. SQL injection attacks (SQLI), for example, continue to rise in number and severity [2]. Commonly used defences are validation functions, web application firewalls (WAFs), and prepared statements. The first two inspect web application inputs and sanitize those that are considered dangerous, whereas the third bounds inputs to placeholders in the SQL queries. Other anti-SQLI mechanisms have been developed but less adopted. Some of these monitor and block SQL queries that deviate from specific models, but the inspection is made without full knowledge about how they are processed by the DBMS. In all these cases, developers and system administrators make assumptions about how the server-side scripting language and the DBMS work and interact, which sometimes are simplistic, whereas in others are blatantly wrong. For example, programmers usually assume that the PHP function mysql_real_escape_string always effectively sanitizes inputs and prevents SQLI attacks, which is not true. Also, they often assume that values retrieved from a database do notneed to be validated before being inserted in a query, leading to second-order injection vulnerabilities. This is visible when, for instance, the code admin’ - - is sanitized by escaping the prime character before sending it to the database, but the DBMS unsanitizes it before actually storing it. Later, the code is retrieved from the database and used unsanitized in some query, carrying out the attack. Such simplistic/wrong assumptions seem to be caused by a semantic mismatchbetween how an SQL query is expected to run and what actually occurs when it is executed (e.g., the programmer expects it to be sanitized but the DBMS unsanitized it). This mismatch may lead to vulnerabilities, as the protectionmechanisms may be ineffective (e.g., they may miss some attacks). To avoid this problem, SQLI attacks could be handled inside, after the server-side code processes the inputs and the DBMS validates the queries, reducing the amount of assumptions that are made. The mismatch and this solution are not restricted to web applications, meaning that the same problemcan be present in other business applications. In fact, injection attacks are a generic form of attack, transversal to all applications that use a database as backend. The paper propose a similar idea for applications backed by databases. Here propose to block injection attacks insidethe DBMS at runtime. The approach is SElf-ProtecTIng databases from attaCks(SEPTIC). The DBMS is an interesting location to add protections against such attacks because it has an unambiguous knowledge about what will be considered as clauses, predicates, and expressions of an SQL statement. No mechanism that actuates outside of the DBMS has such knowledge. Here address two categories of database attacks: SQL injection attacks, which continue to be among those with highest riskand for which new variants continue to appear; and stored injection attacks, including stored cross-site scripting, whichalso involve SQL queries. For SQLI, here propose to catch theattacks by comparing queries with query models, improving anidea that has been previously used only outside of the DBMS and by comparing queries with validated queries with a similarity method, improving detection accuracy.For stored injection, here employ plugins to deal with specificattacks before data are inserted in the database. SEPTIC relies on two new concepts. Before detecting attacks,the mechanism can be trained by forcing calls to all queries inan application. The result is a set of query models. However,as training may be incomplete and not cover all queries, hereintroduce the notion of putting in quarantine queries at runtimefor which SEPTIC has no query model. The second concept,aging, deals with updates to query models after a new releaseof an application, something that is inevitable in real worldsoftware. Both concepts allow a reduction of the false negative (attacks not detected) and false positive (alerts for nonattacks) rates. Another technique which introduce the concept of instruction-set randomization for safeguarding systems against any type of code-injection attack,
  • 3. International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July –Aug 2020 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 27 by creating process-specific randomized instruction sets (e.g., machine instructions) of the system executing potentially vulnerable software. An attacker that does not know the key to the randomization algorithm will inject code that is invalid for that randomized processor (and process), causing a runtime exception. Here applies the same technique to the problem of SQL injection attacks: create randomized instances of the SQL query language, by randomizing the template queryinside the CGI script and the database parser. To allow for easy retrofitting of the solutionto existing systems, introduce a de-randomizing proxy, which converts randomized queries to proper SQL queries for the database. Code injected by the rogue client evaluates to undefined keywords and expressions. When this is the outcome, then standard keywords (e.g., “or”) lose their significance, and attacks are frustrated before they can even commence. The performance overhead of our approach is minimal, adding up to 6.5ms to query processing time. II. LITERATURE SURVEY There is a vast corpus of research in web application security, so Here survey only related runtime protection mechanisms, which is the category in which SEPTIC fits. All the works Here describe have a point in common that makes them quite different from this paper: their focus is on how to do detection or protection. On the contrary, this paper is more concerned with an architectural problem: how to do detection/protection inside the DBMS, so that it runs out of thebox when the DBMS is started. None of the related works doesdetection inside the DBMS. Buehrer et al. present a similar scheme that manages to detect mimicry attacks by enriching the models (parse trees) with comment tokens. However, their scheme cannot deal with most attacks related with the semantic mismatch problem. SqlCheck is another scheme that compares parse trees to detect attacks. SqlCheck detects some of the attacks related with semantic mismatch, but not those involving encoding and evasion. Again, both these mechanisms involve modifying the application code, unlike SEPTIC. DIGLOSSIA is a technique to detect SQLI attacks that was implemented as an extension of the PHP interpreter. The technique first obtains the query models by mapping all query statements’ characters to shadow characters except user inputs, and computes shadow values for all string user inputs. Second, for a query execution, it computes the query and verifies if the root nodes from the two parsed trees are equal. Like SEPTIC, DIGLOSSIA detects syntax structure and mimicry attacks but, unlike SEPTIC, it neither detects second-order SQLI once it only computes queries with user inputs, nor encoding and evasion space characters attacks as these attacks do not alter the parse tree root nodes before the malicious user inputs are processed by the DBMS. Although better than AMNESIA and CANDID, it does not deal with all semantic mismatch problems. Works based on anomaly intrusion detection systems also aim to detect SQLI attacks by comparing models with queries sent by web applications. Valeuret al. present one of these works. The system also undergoes a training phase to create models (a set of profiles) of normal access to the database. In runtime, it detects deviations from that model. SQL-IDS is another system that compares queries against query specifications that define the query syntactic structure (a kind of model) implemented in the application. However, there is no information about how such specifications are created, despite the authors arguing that their source code does not need instrumentation. SQLProb is a proxy-based system that also uses models previously extracted by a specific data collection phase. Afterward, the system evaluates the queries produced by applications, parsing them, and extracting their user inputs, then validates the inputs against the parse tree, resorting to an input repository. For web services, Laranjeiroet al. propose a similar approach to discover SQL and XPath injection attacks. In a first phase, their approach learns regular requests
  • 4. International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July –Aug 2020 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 28 by representing them into invariant statements (a kind of models), and later protects web services by matching incoming requests with those collected in the learning phase. Moreover, the approach uses heuristics to deal with incoming requests that the approach does not learn as invariant. All these systems, like the previously mentioned tools, are external to the DBMS, so they do not use our approach to deal with the semantic mismatch problem. Machine-learning approaches for detection SQLI have been emerging. idMAS-SQL is one of these works. SOFIA also uses machine learning to classify queries issued by applications, resorting to a clustering algorithm. The tool has a training phase to get the parse tree from legitimate queries and to create clusters with these trees. Afterward, in evaluating phase it classifies as attack the queries that do not fit any cluster. Dynamic taint analysis tracks the flow of user inputs in the application and verifies it they reach dangerous instructions. Xu et al. show how this technique can be used to detect SQLI and reflected XSS. They annotate the arguments from source functions and sensitive sinks as untrusted and instrument the source code to track the user inputs to verify if they reach the untrusted arguments of sensitive sinks (e.g., functions that send queries to the database). ARDILLA creates attack vectors that contain mutations of user inputs generated previously, and then deploys such vectors, tracking the inputs and verifying if they exploit SQLI and XSS vulnerabilities. A different but related idea is implemented by CSSE that protects PHP applications from SQLI, XSS, and OSCI by modifying the platform to distinguish between what is part of the program and what is external (input), defining checks to be performed to the latter (e.g., if the query structure becomes different due to inputs). WASP does something similar to block SQLI attacks. SEPTIC does not track inputs in the application, but runs in the DBMS. Recently, Ahuja et al. [1] and Masri and Sleiman presented two works about prevention of SQLI attacks. The first presents a tool called SQLPIL that simply transforms SQL queries created as strings into prepared statements, preventing SQLI in the source code. The second presents three new approaches to detect and prevent SQLI attacks based on rewriting queries, encoding queries, and adding assertions to the code. Here propose three new directions to detect and prevent SQLIA, as an alternative solution. These are (i) Query Rewriting-based approach, (ii) Encoding-based approach, and (iii) Assertion- based approach. The main objective of first approach is to mitigate the effect of concatenation operation during query generation. The objective of the second approach is to mitigate the mal- effect of bad input on query semantics. The assertion-based technique is a state verification technique which can be performed either at application level or at database level. Here provide a comparative study among our proposed approaches based on security guaranty, usability and applicative point of view. III. PROPOSED METHOD SEPTIC Approach SEPTIC is implemented by a module inside the DBMS, allowing every query to be checked for attacks. The semantic mismatch problem is circumvented because queries are evaluated for detection purposes near the end of the DBMS data flow, just before the query is executed. As SEPTIC is inside the DBMS, it is independent from the application (e.g., from the application programming language) and the way it builds queries (e.g., dynamically). This lets SEPTIC analyse queries issued by any kind of application. However, with support from the application, SEPTIC can also contribute to the identification of the vulnerabilities that are being exploited. Approach Overview Figure 1 shows the architecture of a web and a non-Web application with a backend database. When the system starts, SEPTIC may undergo a training phase in order to obtain the query models for the application. Here designates administrator, the person or persons in charge of managing the
  • 5. International Journal of Scientific Research and Engineering Development ©IJSRED: All Rights are Reserved DBMS and SEPTIC (e.g., decides when the training mode ends). Later on, when SEPTIC is put in normal operation, it works basically in the following way. 1) An application requests the execution of a query. Optionally, the query instruction may contain an (external) identifier produced by the server-side language engine (SSLE) or the application. 2) The DBMS receives, parses, and validates the query. Before it executes the query, SEPTIC is called to retrieve its associated quer which is used to detect and block a potential incoming attack. If an external identifier arrives with the query, it is extracted to get context information about the places in the source code of the application where the query was built. This information can be helpful to locate a vulnerability in case an attack is found. SQLRAND Architecture Injecting SQL code into a web application requires little effort by those who understand both the semantics of the SQL language and CGI scripts. Numerous applicationstake user input and feed it into a pre-defined query. The query is then handed tothe database for execution. Unless developers properly design their application codeto protect against unexpected data input by users, alteration to the database structure,corruption of data or revelation of private and confidential information may be grantedinadvertently. For example, consider a login page of a CGI application that expects a user-nameand the corresponding password. When the credentials are International Journal of Scientific Research and Engineering Development-– Volume 3 Issue Available at www.ijsred.com ©IJSRED: All Rights are Reserved DBMS and SEPTIC (e.g., decides when the training mode ends). Later on, when SEPTIC is put in normal operation, it works basically in the 1) An application requests the execution of a ry instruction may contain an (external) identifier produced by the 2) The DBMS receives, parses, and validates the query. Before it executes the query, SEPTIC is called to retrieve its associated query model, which is used to detect and block a potential incoming attack. If an external identifier arrives with the query, it is extracted to get context information about the places in the source code of the application where the query was built. This rmation can be helpful to locate a vulnerability in case an attack is found. Injecting SQL code into a web application requires little effort by those who understand both the semantics of the SQL language and CGI pplicationstake user input and defined query. The query is then handed tothe database for execution. Unless developers properly design their application codeto protect against unexpected data input by users, alteration to the database ructure,corruption of data or revelation of private and confidential information may be For example, consider a login page of a CGI nameand the corresponding password. When the credentials are submitted, they are insertedwithin a query template such as the following: "select * from mysql.userwhere username=’ " . $uid ." ’ andpassword=password(’ ". $pwd . " ’);" Instead of a valid user-name, the malicious user sets the $uid variable to the string causing the CGI script to issue the following SQL query to the database: "select * from mysql.userwhere username=’’ or 1=1; - -’’ andpassword=password(’_any_text_’);" Notice that the single quotes balance the quotes in the pre-defined query, and thedouble hyphen comments out the remainder of the SQL query. Therefore, the passwordvalue is irrelevant and may be set to any character string. The result set of the querycontains at least one record, since the “where” clause evaluates to true. If applicationidentifies a valid user by testing whether the result set is non- canbypass the security check. The solution extends the application of Instruction-Set Randomization to theSQL language: the SQL standard keywords are manipulated by appending a randominteger to them, one that an attacker cannot easily guess. Therefore, any malicious userattempting an SQL injection attack would be thwarted, for the user input inserted intothe “randomized” query would always be classified as a set of non resultingin an invalid expression.Essentially, the structured query language has taken on new keywords that will notbe recognized by the database’s SQL interpreter. A difficult approach would be to modifythe database’s interpreter to accept the new set of keywords. However, attempting tochange its behaviour would be a daunting task. Furthermore, a modified database wouldrequire all applications submitting SQLqueries to conform to its new language. Althoughdedicating the database server selected applications might be possible, therandom key would not be varied among the SQL applications using it. Ideally, havingthe ability to vary the random SQL key, while maintaining one database system, grantsa greater level of security, by making it difficult to subvert multiple applications bysuccessfully attacking the Volume 3 Issue 4, July –Aug 2020 www.ijsred.com Page 29 submitted, they are insertedwithin a query template such as the following: "select * from mysql.userwhere username=’ " . $uid ." ’ andpassword=password(’ ". $pwd . " ’);" name, the malicious user sets the $uid variable to the string:’ or 1=1; - -’, causing the CGI script to issue the following SQL "select * from mysql.userwhere username=’’ or ’’ andpassword=password(’_any_text_’);" Notice that the single quotes balance the quotes in y, and thedouble hyphen comments out the remainder of the SQL query. Therefore, the passwordvalue is irrelevant and may be set to any character string. The result set of the querycontains at least one record, since the “where” clause evaluates to true. If the applicationidentifies a valid user by testing -empty, the attacker solution extends the application of Set Randomization to theSQL language: the SQL standard keywords are lated by appending a randominteger to them, one that an attacker cannot easily guess. Therefore, any malicious userattempting an SQL injection attack would be thwarted, for the user input inserted intothe “randomized” query would set of non-keywords, resultingin an invalid expression.Essentially, the structured query language has taken on new keywords that will notbe recognized by the database’s SQL interpreter. A difficult approach would be to modifythe database’s interpreter to ccept the new set of keywords. However, attempting tochange its behaviour would be a daunting task. Furthermore, a modified database wouldrequire all applications submitting SQLqueries to conform to its new language. Althoughdedicating the database server for selected applications might be possible, therandom key would not be varied among the SQL applications using it. Ideally, havingthe ability to vary the random SQL key, while maintaining one database system, grantsa greater t difficult to subvert multiple applications bysuccessfully attacking the
  • 6. International Journal of Scientific Research and Engineering Development ©IJSRED: All Rights are Reserved least protected one.The design consists of a proxy that sitsbetween the client and database server (seeFigure 2). Note that the proxy may be on a separate machine, unlike the figure’s depiction.By moving the de-randomization process outside the DBMS to the proxy, gains in flexibility, simplicity, and security. Multiple proxiesusing unique random keys to decode SQL commands can be listening for connectionson behalf of the same database, yet allowing disparate SQL applications to communicatein their own “tongue.” The interpreter is no longer bound to the internals ofthe DBMS. The proxy’s primary obligation is to decipher the random SQL query andthen forward the SQL command with th standard set of keywords to the database forcomputation. Another benefit of the proxy is the concealment of database errors whichmay unveil the random SQL keyword extension to the user. A typical attack consists ofa simple injection of SQL, hoping that the error message will disclose a subset of thequery or table information, which may be used to deduce intuitively hidden propertiesof the database. By stripping away the randomization tags in the proxy, we need notworry about the DBMS inadvertently exposing such information through error messages;the DBMS itself never sees the randomization tags. Thus, to ensure the securityof the scheme, we only need to ensure that no messages generated by the proxy itselfare ever sent to the DBMS or the front International Journal of Scientific Research and Engineering Development-– Volume 3 Issue Available at www.ijsred.com ©IJSRED: All Rights are Reserved design consists of a proxy that sitsbetween the client and database server Note that the proxy may be on a separate figure’s depiction.By randomization process outside in flexibility, simplicity, and security. Multiple proxiesusing unique random keys to decode SQL commands can be listening for connectionson behalf of the atabase, yet allowing disparate SQL applications to communicatein their own “tongue.” The interpreter is no longer bound to the internals ofthe DBMS. The proxy’s primary obligation is to decipher the random SQL query andthen forward the SQL command with the standard set of keywords to the database forcomputation. Another benefit of the proxy is the concealment of database errors whichmay unveil the random SQL keyword extension to the user. A typical attack consists ofa simple he error message will disclose a subset of thequery or table information, which may be used to deduce intuitively hidden propertiesof the database. By stripping away the randomization tags in the proxy, we need notworry about the DBMS g such information through error messages;the DBMS itself never sees the randomization tags. Thus, to ensure the securityof the scheme, we only need to ensure that no messages generated by the proxy itselfare ever sent to the DBMS or the front-end server. Given that the proxy itself isfairly simple, it seems possible to secure it against attacks. In the event that the proxyis compromised, the database remains safe, assuming that other security measures arein place. IV. CONCLUSION This paper explored two forms attacks against web and businessapplication databases. It presented the idea of catching attacks inside the DBMS, letting it protected from SQLI and stored injection attacks. Moreover, by putting protection inside the DBMS, is possible to detect and block sophisticated attacks, including those related with the semantic mismatch problem. As a second idea, it presented a form of identifying vulnerabilities in application code, when attacks were detected. This paper also presented SEPTIC, a mechanism implemented inside MySQL and SQLrand, a system for preventing SQL injection attacks against webservers. The main intuition is that by using a randomized SQL query language, specificto a particular CGI application, it is possi and abort queries that include injectedcode. By using a proxy for the de-randomization process, we achieve portabilityand security gains: the same proxy can be used with various DBMS back and itcan ensure that no information that would expose the randomization process can leakfrom the database itself. REFERENCES [1]. B. Ahuja, A. Jana, A. Swarnkar, and R. Halder, “On preventing SQL injection attacks”, Adv. Comput. Syst. Secur. [2]. S. Bandhakavi, P. Bisht, P. Madhusudan, and V. N. Venkatakrishnan, “CANDID: Preventing SQL injection attacks using dynamic candidate evaluations”, in Proc. 14th ACM Conf. Comput. Commun. Secur. 12–24, Oct. 2007. [3]. Berman, V. Bourassa, and E. Selberg. TRON: Process Protection for the UNIX Operating System. In USENIX Technical Conference, Jan. 1995. [4]. S. Bhatkar, D. C. DuVarney, and R. Sekar. Address Obfuscation: an Efficient Approach to Combat a Broad Range of Memory Error Exploits. In Proceedings of the 12th USENIXSecurity Symposium Aug. 2003. Volume 3 Issue 4, July –Aug 2020 www.ijsred.com Page 30 Given that the proxy itself isfairly simple, it seems possible to secure it against attacks. In the event that the proxyis compromised, the database remains safe, assuming that other security measures arein This paper explored two forms of protection from attacks against web and businessapplication databases. It presented the idea of catching attacks protected from SQLI and stored injection attacks. Moreover, by putting protection inside the DBMS, here showed that it is possible to detect and block sophisticated attacks, including those related with the semantic mismatch problem. As a second idea, it presented a form of identifying vulnerabilities in application code, when attacks were detected. This paper also presented SEPTIC, a mechanism implemented inside MySQL and SQLrand, a system for preventing SQL injection attacks against webservers. The main intuition is that by using a randomized SQL query language, specificto a particular CGI application, it is possible to detect and abort queries that include injectedcode. By randomization process, we achieve portabilityand security gains: the same proxy can be used with various DBMS back-end, and itcan ensure that no information that would xpose the randomization process can leakfrom B. Ahuja, A. Jana, A. Swarnkar, and R. Halder, “On preventing SQL Adv. Comput. Syst. Secur. vol. 395, pp. 49–64, 2015. , P. Bisht, P. Madhusudan, and V. N. Venkatakrishnan, “CANDID: Preventing SQL injection attacks using dynamic candidate Proc. 14th ACM Conf. Comput. Commun. Secur., pp. Berman, V. Bourassa, and E. Selberg. TRON: Process-Specific File Protection for the UNIX Operating System. In Proceedings of the S. Bhatkar, D. C. DuVarney, and R. Sekar. Address Obfuscation: an Efficient Approach to Combat a Broad Range of Memory Error Exploits. Security Symposium, pp. 105–120,