SlideShare a Scribd company logo
1 of 3
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1468
PREVENTION OF SQL INJECTION ATTACK IN WEB APPLICATION WITH
HOST LANGUAGE
Surabhi Agrawal1, Upendra Singh2
1, 2Lecturer CSE&IT Department Government Engineering College Bharatpur (Raj.), India
---------------------------------------------------------------------***--------------------------------------------------------------------
Abstract: In recent times, internet is widely used in every
possible field. Applications used by internet and their
databases contain data in secure form but still they can be
attached ,SQLIA attacks which is one of the gruesome attack
to steal the useful data information from database and
malicious attackers will be abletogetunauthorizedaccessto
useful data, by attacking the SQL queries ,websites , web
applications . The malicious users aim to attack on the input
validations by queries which is the most critical part of
software security so to prevent input from gruesome attack
is valuable and to prevent these types of attack and save our
database we used PHP and Java as host language to prevent
our query from these attacks.
Keywords: - SQL injection, SQLIA, PHP, Java, Query
I. INTRODUCTION
As now days, the use of internet is spread on wide level in
means of broadcasting information, and various online
transactions, use of websites for any work , internet is used
in every possible field. These applications used by internet
and their databases also contain all the data in secure form
but still they have sensitive data [1, 2]. The confidentiality of
data in database is not proper and so many attacks can be
performed on the database in which SQL Injection Attacks
known as (SQLIA) is gruesome used attack and it targetedto
access the data from database services. As website is used
widely over the network, the malicious users attack the
website in negative and harm theapplication.SQLIAconsists
of attack against web applications and has injection attacks
in which attacker targets to modify the structure of SQL
query [1, 3]. The changes imposed on SQL query which is
placed by client but malicious user modify it by creating a
well crafted data to username and password field of web
browser without proper validation to get access to the SQL
database and access the useful information by pretending
the valid user [3].
SQL injection attacks consist of some methods of attacks to
maliciously attack database. SQLIA can extract and read
confidential or secure data from database or it can modify
any data and can also execute some unreliable operations.
The database result when expected frommaliciousdatabase
or queries gives incorrect or unsolicited result [1].
II. TYPES OF SQL INJECTION ATTACKS
There are various methods of attacks present that are used
by attacker to extract data and to make attack on queries
these methods are classified as follows [1, 2, 3]:
1. Tautology: This method of SQL attack worksonthe
injection of tokens to given query statement and it
always considered is as true. This attack is mainly
used by query with ‘WHERE’ clause. Query for login
is [1, 2, 3]:
“SELECT * FROM employee WHERE login ID = ‘423’
and password = ‘sss’ OR ‘1’ ‘=’ 1’
Here OR make this statement as tautology (1=1)
and the query statement result is always true.
2. Illegal/LogicallyIncorrect Queries: Whena query
is given in extra and it is not needed, an error
message is displayed fromdatabaseincluding some
debugging information. This message displayed
sometimes useful for attacker tofindvulnerabilities
present in database [1, 2, 3].
Example: SELECT *FROM users WHERE
login=’derived’ AND password=password (select
host from host)
Here the data entered gives irrelevant result and
which causes error by which attacker also comes to
know about the backend applications which are
used.
3. Union Query: In this type of attack the SQL gives
permission to two queries to join and return as a
one result. In union query attacks, an attacker
exploits a given variable from query or it can add
some queries by itself to infuse extra information
and find out the data from database [1, 2, 3].
Example:
Original query: select acc_no from user where
u_id=’45’
Injected Query: select acc_no from user where
u_id=’45’ UNION select card_no from card_details
where u_id=’45’.
4. Piggy – Backed queries: There are many attacks
which used in SQLIA in these on is piggy backed in
which attacker tries to add malicious query by
keeping original query as it is here query is
modified by adding some new distinct data in query
to extract some more information from database.
Here, attackers used one delimiter toaddinoriginal
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1469
query such as “;”, which used to append extra query
[1, 2, 3].
Example:
SELECT name FROM users WHERE u_id=’35’ AND
password=”pass’; droptable users_.
5. Stored Procedures: In this type of attack, the
attacker focuses on procedures that are stored in
database system which is either user defined or
default procedures. Stored procedure is just a code
which contains some vulnerability such as buffer
overflow [1, 2, 3].
6. Inference: In this form of attack, the attacker
changes the behavior of database and this done by
two techniques: blind injection, timing attacks. In
BLIND injection type sometimes the data [1, 2, 3]
7. Blind Injection: The normal SQL injection attack is
the procedure in which hacker know about the
error message that is returned by databaseandrely
on it. But in Blind injection attack the hacker need
not to see the error message or rely on it so It is
called blind injection attack. It described by two
forms [1, 2, 3]:
Content based blind injection attack: in this the
comparison of database queries is based on values
‘TRUE’ or ’FALSE’.
Example: SQL statement is
SELECT name, price FROM store_table WHERE id=
‘46’
Attacker manipulate it to
SELECT name, price FROM store_table WHERE id=
‘46’ and 1=3
Here this will cause the value returnedto be‘FALSE’
and no items displayed on screen.
But when the query is
SELECT name, price FROM store_table WHERE id=
‘46’ and 1=1
Here this will cause the value returned to be ‘TRUE’
and details of id=34 are shown. And this validates
the value of page.
Time based blind injection attack: In this type of
attack the attacker performs a time intensive
operations in which mostly used time based
command is “SLEEP”
SELECT name, price FROM store_table WHERE id=
‘46’ and if(1=1, sleep(10) , false)
This query displayed the result which is delayby10
seconds.
III. PREVENTION OF SQL INJECTION ATTACKS
USING HOST LANGUAGE PHP/JAVA
The SQLIA prevention methods consist of many methods
from which data is to make secure by providing algorithms
in SQL query. In all these methods one method is by using
host language as PHP and Java which is used as a prevention
method by inserting some statements to query so it is not
accessed by any attacker.
1. PHP AS THE HOST LANGUAGE
PHP is a dynamic language which is used in every field now
days. And it can also used to prevent SQL attacks [4].
Example: If we enter the query to extract a password for
particular id or number by PHP
$_name =$_get [‘username’];
$_query = “SELECT password FROM table WHERE name =
‘$_name’”;
Here the attacker add new information to extract the user’s
information from database in which it adds some extra data
as
$_name = “data’ OR 1=1--’”
$_query = “ SELECT password FROM table WHERE name =
‘$_name’”;
Then the result obtained contains
$_query = “ SELECT password FROM table WHERE name =
‘data’ OR 1=1--”;
HERE this is valid query but it displays the whole passwords
of query so it is injected by hacker.
To resolve this type of sql injection attacks PHP gives some
A. prepared statement :
$name = $_get[‘username’]
If ($ stmt = $mysqli -> prepare(“SELECT password FROM
table WHERE name = ‘$_name’”)){
$stmt->mysqli_bind_param(“s”,$name);
$stmt->execute();
$stmt->bind_param($pass);
$stmt->fetch();
Printf( “password for user %s is %s n”, $name ,$pass);
$stmt->close(); }
B. Escaping string:
<?php
$username =
mysqli_real_escape_string($conn,$_post[“username”]);
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1470
$username =
mysqli_real_escape_string($conn,$_post[“password”]);
mysqli_close($conn);
?>
C. Using trim() tags:
<?php
$username = strip_tags(trim($_post[“usernsame”]));
$username strip_tags(trim($_post[“password”]));
mysqli_close($conn);
?>
2. JAVA AS THE HOST LANGUAGE
Using java as host language the sql injection attacks can be
secured by using prepared statements or escape operation
or other methods by which data can be secured.
Example: Suppose a system wants to succeed or extract
some information from database if query returns any result
then authentication succeeds otherwise it fails:
SELECT *FROMemp_table WHEREusername=‘<username>’
AND password=’<password>’
And in between an attackerinsertssomeoperationtoextract
more information from database i.e.
SELECT *FROM emp_table WHERE username= ‘<valid>’ OR
‘1’=’1 AND password=’<PASSWORD>’
Here ‘1’=’1 always returns valuetrue whichgivesresultof all
rows displays on screen .
To remove this in Java we can use prepared statements
A. Using prepared statement
If we use
preparedStatement= “SELECT * FROM emp_table WHERE
username = ?”;
preparedStatement.setString(1, valid);
After this we will be safe and hacker not able to extract our
information from backend.
The prepared statement works ontheprinciplethat byusing
this we can force the user input to be handled as content of a
parameter not as the sql command part. But there is a
limitation in using prepared statement it works when we do
not build our sql command by concatenate two strings here
our query is vulnerable to sql attacks [5].
B. Using callableStatement
By using callable statement we can also prevent our query
from attackers to getinformationfromourdatabaseillegally.
It is used as
public interface callableStatement
extends PreparedStatement
The API of java provides SQL Escape command whichallows
all the stored procedures to be called in a standard way for
all RDBMS. And this syntax is used as syntax of one
parameter [6].
IV. CONCLUSION
SQLIA is an attacking technique here malicious users input
well crafted data to username and password field without
proper validation. In this paper the various methods for
SQLIA prevention are discussed by using PHP and Java as
host language. But with these methods also there is no
complete security provided for database.
V. REFERENCES
[1]. IndraniBalasundaram, Dr. E. Ramaraj “An Approach
to Detect and Prevent SQL Injection Attacks in
Database Using Web Service” International Journal of
Computer Science andNetwork Security,VOL.11No.1,
January 2011, p197-205.
[2]. Rashmi Yeole, ShubhangiNinawe, Payal Dhore,Prof.P.
U. Tembhare “ A Study on Detection and Preventionof
SQL Injection Attack” International Research Journal
of Engineering and Technology Volume: 04 Issue: 3 |
Mar -2017 p 435-438.
[3]. Udit Agarwal, Monika Saxena, Kuldeep SinghRana “A
Survey of SQL Injection Attacks” International
Journal of Advanced Research in Computer Science
and Software Engineering Volume 5, Issue 3, March
2015 p – 286-289.
[4]. PHP Manual, The PHP Group, [Available online] at
http://php.net/manual/en/security.database.sql-
injection.php [Accessed] on 15 November 2017.
[5]. Java Documentation, Oracle Inc., [Available online] at
https://docs.oracle.com/javase/tutorial/jdbc/basics/
prepared.html [Accessed] on 15 November 2017.
[6]. Java Documentation, Oracle Inc., [Available online] at
https://docs.oracle.com/javase/7/docs/api/java/sql/
CallableStatement.html [Accessed] on 15 November
2017.

More Related Content

What's hot

Types of sql injection attacks
Types of sql injection attacksTypes of sql injection attacks
Types of sql injection attacksRespa Peter
 
Automated Detection of Session Fixation Vulnerabilities
Automated Detection of Session Fixation VulnerabilitiesAutomated Detection of Session Fixation Vulnerabilities
Automated Detection of Session Fixation VulnerabilitiesYuji Kosuga
 
Intrusion detection architecture for different network attacks
Intrusion detection architecture for different network attacksIntrusion detection architecture for different network attacks
Intrusion detection architecture for different network attackseSAT Journals
 
Time-Based Blind SQL Injection Using Heavy Queries
Time-Based Blind SQL Injection Using Heavy QueriesTime-Based Blind SQL Injection Using Heavy Queries
Time-Based Blind SQL Injection Using Heavy QueriesChema Alonso
 
How "·$% developers defeat the web vulnerability scanners
How "·$% developers defeat the web vulnerability scannersHow "·$% developers defeat the web vulnerability scanners
How "·$% developers defeat the web vulnerability scannersChema Alonso
 
Practical Approach towards SQLi ppt
Practical Approach towards SQLi pptPractical Approach towards SQLi ppt
Practical Approach towards SQLi pptAhamed Saleem
 
SQL INJECTION
SQL INJECTIONSQL INJECTION
SQL INJECTIONMentorcs
 
Time-Based Blind SQL Injection
Time-Based Blind SQL InjectionTime-Based Blind SQL Injection
Time-Based Blind SQL Injectionmatt_presson
 
Time-Based Blind SQL Injection using Heavy Queries
Time-Based Blind SQL Injection using Heavy QueriesTime-Based Blind SQL Injection using Heavy Queries
Time-Based Blind SQL Injection using Heavy QueriesChema Alonso
 
Ppt on sql injection
Ppt on sql injectionPpt on sql injection
Ppt on sql injectionashish20012
 
SQL Injection Tutorial
SQL Injection TutorialSQL Injection Tutorial
SQL Injection TutorialMagno Logan
 
Sql injection
Sql injectionSql injection
Sql injectionZidh
 
Sql Injection and XSS
Sql Injection and XSSSql Injection and XSS
Sql Injection and XSSMike Crabb
 
A Study on Detection and Prevention of SQL Injection Attack
A Study on Detection and Prevention of SQL Injection AttackA Study on Detection and Prevention of SQL Injection Attack
A Study on Detection and Prevention of SQL Injection AttackIRJET Journal
 

What's hot (20)

Sql injection
Sql injectionSql injection
Sql injection
 
Types of sql injection attacks
Types of sql injection attacksTypes of sql injection attacks
Types of sql injection attacks
 
ieee
ieeeieee
ieee
 
Automated Detection of Session Fixation Vulnerabilities
Automated Detection of Session Fixation VulnerabilitiesAutomated Detection of Session Fixation Vulnerabilities
Automated Detection of Session Fixation Vulnerabilities
 
Intrusion detection architecture for different network attacks
Intrusion detection architecture for different network attacksIntrusion detection architecture for different network attacks
Intrusion detection architecture for different network attacks
 
Time-Based Blind SQL Injection Using Heavy Queries
Time-Based Blind SQL Injection Using Heavy QueriesTime-Based Blind SQL Injection Using Heavy Queries
Time-Based Blind SQL Injection Using Heavy Queries
 
How "·$% developers defeat the web vulnerability scanners
How "·$% developers defeat the web vulnerability scannersHow "·$% developers defeat the web vulnerability scanners
How "·$% developers defeat the web vulnerability scanners
 
Practical Approach towards SQLi ppt
Practical Approach towards SQLi pptPractical Approach towards SQLi ppt
Practical Approach towards SQLi ppt
 
SQL INJECTION
SQL INJECTIONSQL INJECTION
SQL INJECTION
 
Time-Based Blind SQL Injection
Time-Based Blind SQL InjectionTime-Based Blind SQL Injection
Time-Based Blind SQL Injection
 
Time-Based Blind SQL Injection using Heavy Queries
Time-Based Blind SQL Injection using Heavy QueriesTime-Based Blind SQL Injection using Heavy Queries
Time-Based Blind SQL Injection using Heavy Queries
 
Ppt on sql injection
Ppt on sql injectionPpt on sql injection
Ppt on sql injection
 
Sql injection
Sql injectionSql injection
Sql injection
 
SQL Injection Tutorial
SQL Injection TutorialSQL Injection Tutorial
SQL Injection Tutorial
 
How to identify and prevent SQL injection
How to identify and prevent SQL injection  How to identify and prevent SQL injection
How to identify and prevent SQL injection
 
Sql injection
Sql injectionSql injection
Sql injection
 
Sql Injection and XSS
Sql Injection and XSSSql Injection and XSS
Sql Injection and XSS
 
Web application security
Web application securityWeb application security
Web application security
 
SQL Injection
SQL InjectionSQL Injection
SQL Injection
 
A Study on Detection and Prevention of SQL Injection Attack
A Study on Detection and Prevention of SQL Injection AttackA Study on Detection and Prevention of SQL Injection Attack
A Study on Detection and Prevention of SQL Injection Attack
 

Similar to Prevention of SQL Injection Attack in Web Application with Host Language

Security vulnerabilities related to web-based data
Security vulnerabilities related to web-based dataSecurity vulnerabilities related to web-based data
Security vulnerabilities related to web-based dataTELKOMNIKA JOURNAL
 
Code injection and green sql
Code injection and green sqlCode injection and green sql
Code injection and green sqlKaustav Sengupta
 
Web Security - OWASP - SQL injection & Cross Site Scripting XSS
Web Security - OWASP - SQL injection & Cross Site Scripting XSSWeb Security - OWASP - SQL injection & Cross Site Scripting XSS
Web Security - OWASP - SQL injection & Cross Site Scripting XSSIvan Ortega
 
GreenSQL Security
 GreenSQL Security GreenSQL Security
GreenSQL Securityijsrd.com
 
IRJET - SQL Injection: Attack & Mitigation
IRJET - SQL Injection: Attack & MitigationIRJET - SQL Injection: Attack & Mitigation
IRJET - SQL Injection: Attack & MitigationIRJET Journal
 
Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020Moataz Kamel
 
SQL Injection Prevention by Adaptive Algorithm
SQL Injection Prevention by Adaptive AlgorithmSQL Injection Prevention by Adaptive Algorithm
SQL Injection Prevention by Adaptive AlgorithmIOSR Journals
 
IRJET- An Efficient Technique for Finding SQL Injection using Reverse Proxy S...
IRJET- An Efficient Technique for Finding SQL Injection using Reverse Proxy S...IRJET- An Efficient Technique for Finding SQL Injection using Reverse Proxy S...
IRJET- An Efficient Technique for Finding SQL Injection using Reverse Proxy S...IRJET Journal
 
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...Rana sing
 
Final review ppt
Final review pptFinal review ppt
Final review pptRana sing
 
Study of Web Application Attacks & Their Countermeasures
Study of Web Application Attacks & Their CountermeasuresStudy of Web Application Attacks & Their Countermeasures
Study of Web Application Attacks & Their Countermeasuresidescitation
 
SQLSecurity.ppt
SQLSecurity.pptSQLSecurity.ppt
SQLSecurity.pptCNSHacking
 
SQLSecurity.ppt
SQLSecurity.pptSQLSecurity.ppt
SQLSecurity.pptLokeshK66
 

Similar to Prevention of SQL Injection Attack in Web Application with Host Language (20)

Security vulnerabilities related to web-based data
Security vulnerabilities related to web-based dataSecurity vulnerabilities related to web-based data
Security vulnerabilities related to web-based data
 
Greensql2007
Greensql2007Greensql2007
Greensql2007
 
Code injection and green sql
Code injection and green sqlCode injection and green sql
Code injection and green sql
 
Web Security - OWASP - SQL injection & Cross Site Scripting XSS
Web Security - OWASP - SQL injection & Cross Site Scripting XSSWeb Security - OWASP - SQL injection & Cross Site Scripting XSS
Web Security - OWASP - SQL injection & Cross Site Scripting XSS
 
GreenSQL Security
 GreenSQL Security GreenSQL Security
GreenSQL Security
 
ASP.NET Web Security
ASP.NET Web SecurityASP.NET Web Security
ASP.NET Web Security
 
SQL Injection
SQL InjectionSQL Injection
SQL Injection
 
IRJET - SQL Injection: Attack & Mitigation
IRJET - SQL Injection: Attack & MitigationIRJET - SQL Injection: Attack & Mitigation
IRJET - SQL Injection: Attack & Mitigation
 
Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020
 
E017131924
E017131924E017131924
E017131924
 
SQL Injection Prevention by Adaptive Algorithm
SQL Injection Prevention by Adaptive AlgorithmSQL Injection Prevention by Adaptive Algorithm
SQL Injection Prevention by Adaptive Algorithm
 
IRJET- An Efficient Technique for Finding SQL Injection using Reverse Proxy S...
IRJET- An Efficient Technique for Finding SQL Injection using Reverse Proxy S...IRJET- An Efficient Technique for Finding SQL Injection using Reverse Proxy S...
IRJET- An Efficient Technique for Finding SQL Injection using Reverse Proxy S...
 
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
 
Final review ppt
Final review pptFinal review ppt
Final review ppt
 
Study of Web Application Attacks & Their Countermeasures
Study of Web Application Attacks & Their CountermeasuresStudy of Web Application Attacks & Their Countermeasures
Study of Web Application Attacks & Their Countermeasures
 
SecureWV: Exploiting Web APIs
SecureWV: Exploiting Web APIsSecureWV: Exploiting Web APIs
SecureWV: Exploiting Web APIs
 
Sql injection
Sql injectionSql injection
Sql injection
 
SQLSecurity.ppt
SQLSecurity.pptSQLSecurity.ppt
SQLSecurity.ppt
 
SQLSecurity.ppt
SQLSecurity.pptSQLSecurity.ppt
SQLSecurity.ppt
 
Secure Software Engineering
Secure Software EngineeringSecure Software Engineering
Secure Software Engineering
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 

Recently uploaded (20)

High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 

Prevention of SQL Injection Attack in Web Application with Host Language

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1468 PREVENTION OF SQL INJECTION ATTACK IN WEB APPLICATION WITH HOST LANGUAGE Surabhi Agrawal1, Upendra Singh2 1, 2Lecturer CSE&IT Department Government Engineering College Bharatpur (Raj.), India ---------------------------------------------------------------------***-------------------------------------------------------------------- Abstract: In recent times, internet is widely used in every possible field. Applications used by internet and their databases contain data in secure form but still they can be attached ,SQLIA attacks which is one of the gruesome attack to steal the useful data information from database and malicious attackers will be abletogetunauthorizedaccessto useful data, by attacking the SQL queries ,websites , web applications . The malicious users aim to attack on the input validations by queries which is the most critical part of software security so to prevent input from gruesome attack is valuable and to prevent these types of attack and save our database we used PHP and Java as host language to prevent our query from these attacks. Keywords: - SQL injection, SQLIA, PHP, Java, Query I. INTRODUCTION As now days, the use of internet is spread on wide level in means of broadcasting information, and various online transactions, use of websites for any work , internet is used in every possible field. These applications used by internet and their databases also contain all the data in secure form but still they have sensitive data [1, 2]. The confidentiality of data in database is not proper and so many attacks can be performed on the database in which SQL Injection Attacks known as (SQLIA) is gruesome used attack and it targetedto access the data from database services. As website is used widely over the network, the malicious users attack the website in negative and harm theapplication.SQLIAconsists of attack against web applications and has injection attacks in which attacker targets to modify the structure of SQL query [1, 3]. The changes imposed on SQL query which is placed by client but malicious user modify it by creating a well crafted data to username and password field of web browser without proper validation to get access to the SQL database and access the useful information by pretending the valid user [3]. SQL injection attacks consist of some methods of attacks to maliciously attack database. SQLIA can extract and read confidential or secure data from database or it can modify any data and can also execute some unreliable operations. The database result when expected frommaliciousdatabase or queries gives incorrect or unsolicited result [1]. II. TYPES OF SQL INJECTION ATTACKS There are various methods of attacks present that are used by attacker to extract data and to make attack on queries these methods are classified as follows [1, 2, 3]: 1. Tautology: This method of SQL attack worksonthe injection of tokens to given query statement and it always considered is as true. This attack is mainly used by query with ‘WHERE’ clause. Query for login is [1, 2, 3]: “SELECT * FROM employee WHERE login ID = ‘423’ and password = ‘sss’ OR ‘1’ ‘=’ 1’ Here OR make this statement as tautology (1=1) and the query statement result is always true. 2. Illegal/LogicallyIncorrect Queries: Whena query is given in extra and it is not needed, an error message is displayed fromdatabaseincluding some debugging information. This message displayed sometimes useful for attacker tofindvulnerabilities present in database [1, 2, 3]. Example: SELECT *FROM users WHERE login=’derived’ AND password=password (select host from host) Here the data entered gives irrelevant result and which causes error by which attacker also comes to know about the backend applications which are used. 3. Union Query: In this type of attack the SQL gives permission to two queries to join and return as a one result. In union query attacks, an attacker exploits a given variable from query or it can add some queries by itself to infuse extra information and find out the data from database [1, 2, 3]. Example: Original query: select acc_no from user where u_id=’45’ Injected Query: select acc_no from user where u_id=’45’ UNION select card_no from card_details where u_id=’45’. 4. Piggy – Backed queries: There are many attacks which used in SQLIA in these on is piggy backed in which attacker tries to add malicious query by keeping original query as it is here query is modified by adding some new distinct data in query to extract some more information from database. Here, attackers used one delimiter toaddinoriginal
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1469 query such as “;”, which used to append extra query [1, 2, 3]. Example: SELECT name FROM users WHERE u_id=’35’ AND password=”pass’; droptable users_. 5. Stored Procedures: In this type of attack, the attacker focuses on procedures that are stored in database system which is either user defined or default procedures. Stored procedure is just a code which contains some vulnerability such as buffer overflow [1, 2, 3]. 6. Inference: In this form of attack, the attacker changes the behavior of database and this done by two techniques: blind injection, timing attacks. In BLIND injection type sometimes the data [1, 2, 3] 7. Blind Injection: The normal SQL injection attack is the procedure in which hacker know about the error message that is returned by databaseandrely on it. But in Blind injection attack the hacker need not to see the error message or rely on it so It is called blind injection attack. It described by two forms [1, 2, 3]: Content based blind injection attack: in this the comparison of database queries is based on values ‘TRUE’ or ’FALSE’. Example: SQL statement is SELECT name, price FROM store_table WHERE id= ‘46’ Attacker manipulate it to SELECT name, price FROM store_table WHERE id= ‘46’ and 1=3 Here this will cause the value returnedto be‘FALSE’ and no items displayed on screen. But when the query is SELECT name, price FROM store_table WHERE id= ‘46’ and 1=1 Here this will cause the value returned to be ‘TRUE’ and details of id=34 are shown. And this validates the value of page. Time based blind injection attack: In this type of attack the attacker performs a time intensive operations in which mostly used time based command is “SLEEP” SELECT name, price FROM store_table WHERE id= ‘46’ and if(1=1, sleep(10) , false) This query displayed the result which is delayby10 seconds. III. PREVENTION OF SQL INJECTION ATTACKS USING HOST LANGUAGE PHP/JAVA The SQLIA prevention methods consist of many methods from which data is to make secure by providing algorithms in SQL query. In all these methods one method is by using host language as PHP and Java which is used as a prevention method by inserting some statements to query so it is not accessed by any attacker. 1. PHP AS THE HOST LANGUAGE PHP is a dynamic language which is used in every field now days. And it can also used to prevent SQL attacks [4]. Example: If we enter the query to extract a password for particular id or number by PHP $_name =$_get [‘username’]; $_query = “SELECT password FROM table WHERE name = ‘$_name’”; Here the attacker add new information to extract the user’s information from database in which it adds some extra data as $_name = “data’ OR 1=1--’” $_query = “ SELECT password FROM table WHERE name = ‘$_name’”; Then the result obtained contains $_query = “ SELECT password FROM table WHERE name = ‘data’ OR 1=1--”; HERE this is valid query but it displays the whole passwords of query so it is injected by hacker. To resolve this type of sql injection attacks PHP gives some A. prepared statement : $name = $_get[‘username’] If ($ stmt = $mysqli -> prepare(“SELECT password FROM table WHERE name = ‘$_name’”)){ $stmt->mysqli_bind_param(“s”,$name); $stmt->execute(); $stmt->bind_param($pass); $stmt->fetch(); Printf( “password for user %s is %s n”, $name ,$pass); $stmt->close(); } B. Escaping string: <?php $username = mysqli_real_escape_string($conn,$_post[“username”]);
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1470 $username = mysqli_real_escape_string($conn,$_post[“password”]); mysqli_close($conn); ?> C. Using trim() tags: <?php $username = strip_tags(trim($_post[“usernsame”])); $username strip_tags(trim($_post[“password”])); mysqli_close($conn); ?> 2. JAVA AS THE HOST LANGUAGE Using java as host language the sql injection attacks can be secured by using prepared statements or escape operation or other methods by which data can be secured. Example: Suppose a system wants to succeed or extract some information from database if query returns any result then authentication succeeds otherwise it fails: SELECT *FROMemp_table WHEREusername=‘<username>’ AND password=’<password>’ And in between an attackerinsertssomeoperationtoextract more information from database i.e. SELECT *FROM emp_table WHERE username= ‘<valid>’ OR ‘1’=’1 AND password=’<PASSWORD>’ Here ‘1’=’1 always returns valuetrue whichgivesresultof all rows displays on screen . To remove this in Java we can use prepared statements A. Using prepared statement If we use preparedStatement= “SELECT * FROM emp_table WHERE username = ?”; preparedStatement.setString(1, valid); After this we will be safe and hacker not able to extract our information from backend. The prepared statement works ontheprinciplethat byusing this we can force the user input to be handled as content of a parameter not as the sql command part. But there is a limitation in using prepared statement it works when we do not build our sql command by concatenate two strings here our query is vulnerable to sql attacks [5]. B. Using callableStatement By using callable statement we can also prevent our query from attackers to getinformationfromourdatabaseillegally. It is used as public interface callableStatement extends PreparedStatement The API of java provides SQL Escape command whichallows all the stored procedures to be called in a standard way for all RDBMS. And this syntax is used as syntax of one parameter [6]. IV. CONCLUSION SQLIA is an attacking technique here malicious users input well crafted data to username and password field without proper validation. In this paper the various methods for SQLIA prevention are discussed by using PHP and Java as host language. But with these methods also there is no complete security provided for database. V. REFERENCES [1]. IndraniBalasundaram, Dr. E. Ramaraj “An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service” International Journal of Computer Science andNetwork Security,VOL.11No.1, January 2011, p197-205. [2]. Rashmi Yeole, ShubhangiNinawe, Payal Dhore,Prof.P. U. Tembhare “ A Study on Detection and Preventionof SQL Injection Attack” International Research Journal of Engineering and Technology Volume: 04 Issue: 3 | Mar -2017 p 435-438. [3]. Udit Agarwal, Monika Saxena, Kuldeep SinghRana “A Survey of SQL Injection Attacks” International Journal of Advanced Research in Computer Science and Software Engineering Volume 5, Issue 3, March 2015 p – 286-289. [4]. PHP Manual, The PHP Group, [Available online] at http://php.net/manual/en/security.database.sql- injection.php [Accessed] on 15 November 2017. [5]. Java Documentation, Oracle Inc., [Available online] at https://docs.oracle.com/javase/tutorial/jdbc/basics/ prepared.html [Accessed] on 15 November 2017. [6]. Java Documentation, Oracle Inc., [Available online] at https://docs.oracle.com/javase/7/docs/api/java/sql/ CallableStatement.html [Accessed] on 15 November 2017.