SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1468
PREVENTION OF SQL INJECTION ATTACK IN WEB APPLICATION WITH
HOST LANGUAGE
Surabhi Agrawal1, Upendra Singh2
1, 2Lecturer CSE&IT Department Government Engineering College Bharatpur (Raj.), India
---------------------------------------------------------------------***--------------------------------------------------------------------
Abstract: In recent times, internet is widely used in every
possible field. Applications used by internet and their
databases contain data in secure form but still they can be
attached ,SQLIA attacks which is one of the gruesome attack
to steal the useful data information from database and
malicious attackers will be abletogetunauthorizedaccessto
useful data, by attacking the SQL queries ,websites , web
applications . The malicious users aim to attack on the input
validations by queries which is the most critical part of
software security so to prevent input from gruesome attack
is valuable and to prevent these types of attack and save our
database we used PHP and Java as host language to prevent
our query from these attacks.
Keywords: - SQL injection, SQLIA, PHP, Java, Query
I. INTRODUCTION
As now days, the use of internet is spread on wide level in
means of broadcasting information, and various online
transactions, use of websites for any work , internet is used
in every possible field. These applications used by internet
and their databases also contain all the data in secure form
but still they have sensitive data [1, 2]. The confidentiality of
data in database is not proper and so many attacks can be
performed on the database in which SQL Injection Attacks
known as (SQLIA) is gruesome used attack and it targetedto
access the data from database services. As website is used
widely over the network, the malicious users attack the
website in negative and harm theapplication.SQLIAconsists
of attack against web applications and has injection attacks
in which attacker targets to modify the structure of SQL
query [1, 3]. The changes imposed on SQL query which is
placed by client but malicious user modify it by creating a
well crafted data to username and password field of web
browser without proper validation to get access to the SQL
database and access the useful information by pretending
the valid user [3].
SQL injection attacks consist of some methods of attacks to
maliciously attack database. SQLIA can extract and read
confidential or secure data from database or it can modify
any data and can also execute some unreliable operations.
The database result when expected frommaliciousdatabase
or queries gives incorrect or unsolicited result [1].
II. TYPES OF SQL INJECTION ATTACKS
There are various methods of attacks present that are used
by attacker to extract data and to make attack on queries
these methods are classified as follows [1, 2, 3]:
1. Tautology: This method of SQL attack worksonthe
injection of tokens to given query statement and it
always considered is as true. This attack is mainly
used by query with ‘WHERE’ clause. Query for login
is [1, 2, 3]:
“SELECT * FROM employee WHERE login ID = ‘423’
and password = ‘sss’ OR ‘1’ ‘=’ 1’
Here OR make this statement as tautology (1=1)
and the query statement result is always true.
2. Illegal/LogicallyIncorrect Queries: Whena query
is given in extra and it is not needed, an error
message is displayed fromdatabaseincluding some
debugging information. This message displayed
sometimes useful for attacker tofindvulnerabilities
present in database [1, 2, 3].
Example: SELECT *FROM users WHERE
login=’derived’ AND password=password (select
host from host)
Here the data entered gives irrelevant result and
which causes error by which attacker also comes to
know about the backend applications which are
used.
3. Union Query: In this type of attack the SQL gives
permission to two queries to join and return as a
one result. In union query attacks, an attacker
exploits a given variable from query or it can add
some queries by itself to infuse extra information
and find out the data from database [1, 2, 3].
Example:
Original query: select acc_no from user where
u_id=’45’
Injected Query: select acc_no from user where
u_id=’45’ UNION select card_no from card_details
where u_id=’45’.
4. Piggy – Backed queries: There are many attacks
which used in SQLIA in these on is piggy backed in
which attacker tries to add malicious query by
keeping original query as it is here query is
modified by adding some new distinct data in query
to extract some more information from database.
Here, attackers used one delimiter toaddinoriginal
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1469
query such as “;”, which used to append extra query
[1, 2, 3].
Example:
SELECT name FROM users WHERE u_id=’35’ AND
password=”pass’; droptable users_.
5. Stored Procedures: In this type of attack, the
attacker focuses on procedures that are stored in
database system which is either user defined or
default procedures. Stored procedure is just a code
which contains some vulnerability such as buffer
overflow [1, 2, 3].
6. Inference: In this form of attack, the attacker
changes the behavior of database and this done by
two techniques: blind injection, timing attacks. In
BLIND injection type sometimes the data [1, 2, 3]
7. Blind Injection: The normal SQL injection attack is
the procedure in which hacker know about the
error message that is returned by databaseandrely
on it. But in Blind injection attack the hacker need
not to see the error message or rely on it so It is
called blind injection attack. It described by two
forms [1, 2, 3]:
Content based blind injection attack: in this the
comparison of database queries is based on values
‘TRUE’ or ’FALSE’.
Example: SQL statement is
SELECT name, price FROM store_table WHERE id=
‘46’
Attacker manipulate it to
SELECT name, price FROM store_table WHERE id=
‘46’ and 1=3
Here this will cause the value returnedto be‘FALSE’
and no items displayed on screen.
But when the query is
SELECT name, price FROM store_table WHERE id=
‘46’ and 1=1
Here this will cause the value returned to be ‘TRUE’
and details of id=34 are shown. And this validates
the value of page.
Time based blind injection attack: In this type of
attack the attacker performs a time intensive
operations in which mostly used time based
command is “SLEEP”
SELECT name, price FROM store_table WHERE id=
‘46’ and if(1=1, sleep(10) , false)
This query displayed the result which is delayby10
seconds.
III. PREVENTION OF SQL INJECTION ATTACKS
USING HOST LANGUAGE PHP/JAVA
The SQLIA prevention methods consist of many methods
from which data is to make secure by providing algorithms
in SQL query. In all these methods one method is by using
host language as PHP and Java which is used as a prevention
method by inserting some statements to query so it is not
accessed by any attacker.
1. PHP AS THE HOST LANGUAGE
PHP is a dynamic language which is used in every field now
days. And it can also used to prevent SQL attacks [4].
Example: If we enter the query to extract a password for
particular id or number by PHP
$_name =$_get [‘username’];
$_query = “SELECT password FROM table WHERE name =
‘$_name’”;
Here the attacker add new information to extract the user’s
information from database in which it adds some extra data
as
$_name = “data’ OR 1=1--’”
$_query = “ SELECT password FROM table WHERE name =
‘$_name’”;
Then the result obtained contains
$_query = “ SELECT password FROM table WHERE name =
‘data’ OR 1=1--”;
HERE this is valid query but it displays the whole passwords
of query so it is injected by hacker.
To resolve this type of sql injection attacks PHP gives some
A. prepared statement :
$name = $_get[‘username’]
If ($ stmt = $mysqli -> prepare(“SELECT password FROM
table WHERE name = ‘$_name’”)){
$stmt->mysqli_bind_param(“s”,$name);
$stmt->execute();
$stmt->bind_param($pass);
$stmt->fetch();
Printf( “password for user %s is %s n”, $name ,$pass);
$stmt->close(); }
B. Escaping string:
<?php
$username =
mysqli_real_escape_string($conn,$_post[“username”]);
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1470
$username =
mysqli_real_escape_string($conn,$_post[“password”]);
mysqli_close($conn);
?>
C. Using trim() tags:
<?php
$username = strip_tags(trim($_post[“usernsame”]));
$username strip_tags(trim($_post[“password”]));
mysqli_close($conn);
?>
2. JAVA AS THE HOST LANGUAGE
Using java as host language the sql injection attacks can be
secured by using prepared statements or escape operation
or other methods by which data can be secured.
Example: Suppose a system wants to succeed or extract
some information from database if query returns any result
then authentication succeeds otherwise it fails:
SELECT *FROMemp_table WHEREusername=‘<username>’
AND password=’<password>’
And in between an attackerinsertssomeoperationtoextract
more information from database i.e.
SELECT *FROM emp_table WHERE username= ‘<valid>’ OR
‘1’=’1 AND password=’<PASSWORD>’
Here ‘1’=’1 always returns valuetrue whichgivesresultof all
rows displays on screen .
To remove this in Java we can use prepared statements
A. Using prepared statement
If we use
preparedStatement= “SELECT * FROM emp_table WHERE
username = ?”;
preparedStatement.setString(1, valid);
After this we will be safe and hacker not able to extract our
information from backend.
The prepared statement works ontheprinciplethat byusing
this we can force the user input to be handled as content of a
parameter not as the sql command part. But there is a
limitation in using prepared statement it works when we do
not build our sql command by concatenate two strings here
our query is vulnerable to sql attacks [5].
B. Using callableStatement
By using callable statement we can also prevent our query
from attackers to getinformationfromourdatabaseillegally.
It is used as
public interface callableStatement
extends PreparedStatement
The API of java provides SQL Escape command whichallows
all the stored procedures to be called in a standard way for
all RDBMS. And this syntax is used as syntax of one
parameter [6].
IV. CONCLUSION
SQLIA is an attacking technique here malicious users input
well crafted data to username and password field without
proper validation. In this paper the various methods for
SQLIA prevention are discussed by using PHP and Java as
host language. But with these methods also there is no
complete security provided for database.
V. REFERENCES
[1]. IndraniBalasundaram, Dr. E. Ramaraj “An Approach
to Detect and Prevent SQL Injection Attacks in
Database Using Web Service” International Journal of
Computer Science andNetwork Security,VOL.11No.1,
January 2011, p197-205.
[2]. Rashmi Yeole, ShubhangiNinawe, Payal Dhore,Prof.P.
U. Tembhare “ A Study on Detection and Preventionof
SQL Injection Attack” International Research Journal
of Engineering and Technology Volume: 04 Issue: 3 |
Mar -2017 p 435-438.
[3]. Udit Agarwal, Monika Saxena, Kuldeep SinghRana “A
Survey of SQL Injection Attacks” International
Journal of Advanced Research in Computer Science
and Software Engineering Volume 5, Issue 3, March
2015 p – 286-289.
[4]. PHP Manual, The PHP Group, [Available online] at
http://php.net/manual/en/security.database.sql-
injection.php [Accessed] on 15 November 2017.
[5]. Java Documentation, Oracle Inc., [Available online] at
https://docs.oracle.com/javase/tutorial/jdbc/basics/
prepared.html [Accessed] on 15 November 2017.
[6]. Java Documentation, Oracle Inc., [Available online] at
https://docs.oracle.com/javase/7/docs/api/java/sql/
CallableStatement.html [Accessed] on 15 November
2017.
Ad

More Related Content

What's hot (20)

Sql injection
Sql injectionSql injection
Sql injection
Pallavi Biswas
 
Types of sql injection attacks
Types of sql injection attacksTypes of sql injection attacks
Types of sql injection attacks
Respa Peter
 
ieee
ieeeieee
ieee
Radheshyam Dhakad
 
Automated Detection of Session Fixation Vulnerabilities
Automated Detection of Session Fixation VulnerabilitiesAutomated Detection of Session Fixation Vulnerabilities
Automated Detection of Session Fixation Vulnerabilities
Yuji Kosuga
 
Intrusion detection architecture for different network attacks
Intrusion detection architecture for different network attacksIntrusion detection architecture for different network attacks
Intrusion detection architecture for different network attacks
eSAT Journals
 
Time-Based Blind SQL Injection Using Heavy Queries
Time-Based Blind SQL Injection Using Heavy QueriesTime-Based Blind SQL Injection Using Heavy Queries
Time-Based Blind SQL Injection Using Heavy Queries
Chema Alonso
 
How "·$% developers defeat the web vulnerability scanners
How "·$% developers defeat the web vulnerability scannersHow "·$% developers defeat the web vulnerability scanners
How "·$% developers defeat the web vulnerability scanners
Chema Alonso
 
Practical Approach towards SQLi ppt
Practical Approach towards SQLi pptPractical Approach towards SQLi ppt
Practical Approach towards SQLi ppt
Ahamed Saleem
 
SQL INJECTION
SQL INJECTIONSQL INJECTION
SQL INJECTION
Mentorcs
 
Time-Based Blind SQL Injection
Time-Based Blind SQL InjectionTime-Based Blind SQL Injection
Time-Based Blind SQL Injection
matt_presson
 
Time-Based Blind SQL Injection using Heavy Queries
Time-Based Blind SQL Injection using Heavy QueriesTime-Based Blind SQL Injection using Heavy Queries
Time-Based Blind SQL Injection using Heavy Queries
Chema Alonso
 
Ppt on sql injection
Ppt on sql injectionPpt on sql injection
Ppt on sql injection
ashish20012
 
Sql injection
Sql injectionSql injection
Sql injection
Nuruzzaman Milon
 
SQL Injection Tutorial
SQL Injection TutorialSQL Injection Tutorial
SQL Injection Tutorial
Magno Logan
 
How to identify and prevent SQL injection
How to identify and prevent SQL injection  How to identify and prevent SQL injection
How to identify and prevent SQL injection
Eguardian Global Services
 
Sql injection
Sql injectionSql injection
Sql injection
Zidh
 
Sql Injection and XSS
Sql Injection and XSSSql Injection and XSS
Sql Injection and XSS
Mike Crabb
 
Web application security
Web application securityWeb application security
Web application security
www.netgains.org
 
SQL Injection
SQL InjectionSQL Injection
SQL Injection
Abhinav Nair
 
A Study on Detection and Prevention of SQL Injection Attack
A Study on Detection and Prevention of SQL Injection AttackA Study on Detection and Prevention of SQL Injection Attack
A Study on Detection and Prevention of SQL Injection Attack
IRJET Journal
 
Types of sql injection attacks
Types of sql injection attacksTypes of sql injection attacks
Types of sql injection attacks
Respa Peter
 
Automated Detection of Session Fixation Vulnerabilities
Automated Detection of Session Fixation VulnerabilitiesAutomated Detection of Session Fixation Vulnerabilities
Automated Detection of Session Fixation Vulnerabilities
Yuji Kosuga
 
Intrusion detection architecture for different network attacks
Intrusion detection architecture for different network attacksIntrusion detection architecture for different network attacks
Intrusion detection architecture for different network attacks
eSAT Journals
 
Time-Based Blind SQL Injection Using Heavy Queries
Time-Based Blind SQL Injection Using Heavy QueriesTime-Based Blind SQL Injection Using Heavy Queries
Time-Based Blind SQL Injection Using Heavy Queries
Chema Alonso
 
How "·$% developers defeat the web vulnerability scanners
How "·$% developers defeat the web vulnerability scannersHow "·$% developers defeat the web vulnerability scanners
How "·$% developers defeat the web vulnerability scanners
Chema Alonso
 
Practical Approach towards SQLi ppt
Practical Approach towards SQLi pptPractical Approach towards SQLi ppt
Practical Approach towards SQLi ppt
Ahamed Saleem
 
SQL INJECTION
SQL INJECTIONSQL INJECTION
SQL INJECTION
Mentorcs
 
Time-Based Blind SQL Injection
Time-Based Blind SQL InjectionTime-Based Blind SQL Injection
Time-Based Blind SQL Injection
matt_presson
 
Time-Based Blind SQL Injection using Heavy Queries
Time-Based Blind SQL Injection using Heavy QueriesTime-Based Blind SQL Injection using Heavy Queries
Time-Based Blind SQL Injection using Heavy Queries
Chema Alonso
 
Ppt on sql injection
Ppt on sql injectionPpt on sql injection
Ppt on sql injection
ashish20012
 
SQL Injection Tutorial
SQL Injection TutorialSQL Injection Tutorial
SQL Injection Tutorial
Magno Logan
 
Sql injection
Sql injectionSql injection
Sql injection
Zidh
 
Sql Injection and XSS
Sql Injection and XSSSql Injection and XSS
Sql Injection and XSS
Mike Crabb
 
A Study on Detection and Prevention of SQL Injection Attack
A Study on Detection and Prevention of SQL Injection AttackA Study on Detection and Prevention of SQL Injection Attack
A Study on Detection and Prevention of SQL Injection Attack
IRJET Journal
 

Similar to Prevention of SQL Injection Attack in Web Application with Host Language (20)

Security vulnerabilities related to web-based data
Security vulnerabilities related to web-based dataSecurity vulnerabilities related to web-based data
Security vulnerabilities related to web-based data
TELKOMNIKA JOURNAL
 
Greensql2007
Greensql2007Greensql2007
Greensql2007
Kaustav Sengupta
 
Code injection and green sql
Code injection and green sqlCode injection and green sql
Code injection and green sql
Kaustav Sengupta
 
Web Security - OWASP - SQL injection & Cross Site Scripting XSS
Web Security - OWASP - SQL injection & Cross Site Scripting XSSWeb Security - OWASP - SQL injection & Cross Site Scripting XSS
Web Security - OWASP - SQL injection & Cross Site Scripting XSS
Ivan Ortega
 
GreenSQL Security
 GreenSQL Security GreenSQL Security
GreenSQL Security
ijsrd.com
 
ASP.NET Web Security
ASP.NET Web SecurityASP.NET Web Security
ASP.NET Web Security
SharePointRadi
 
SQL Injection
SQL InjectionSQL Injection
SQL Injection
Asish Kumar Rath
 
IRJET - SQL Injection: Attack & Mitigation
IRJET - SQL Injection: Attack & MitigationIRJET - SQL Injection: Attack & Mitigation
IRJET - SQL Injection: Attack & Mitigation
IRJET Journal
 
Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020
Moataz Kamel
 
SQL Injection Prevention by Adaptive Algorithm
SQL Injection Prevention by Adaptive AlgorithmSQL Injection Prevention by Adaptive Algorithm
SQL Injection Prevention by Adaptive Algorithm
IOSR Journals
 
E017131924
E017131924E017131924
E017131924
IOSR Journals
 
IRJET- An Efficient Technique for Finding SQL Injection using Reverse Proxy S...
IRJET- An Efficient Technique for Finding SQL Injection using Reverse Proxy S...IRJET- An Efficient Technique for Finding SQL Injection using Reverse Proxy S...
IRJET- An Efficient Technique for Finding SQL Injection using Reverse Proxy S...
IRJET Journal
 
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
Rana sing
 
Final review ppt
Final review pptFinal review ppt
Final review ppt
Rana sing
 
Study of Web Application Attacks & Their Countermeasures
Study of Web Application Attacks & Their CountermeasuresStudy of Web Application Attacks & Their Countermeasures
Study of Web Application Attacks & Their Countermeasures
idescitation
 
SecureWV: Exploiting Web APIs
SecureWV: Exploiting Web APIsSecureWV: Exploiting Web APIs
SecureWV: Exploiting Web APIs
ThreatReel Podcast
 
Sql injection
Sql injectionSql injection
Sql injection
Mehul Boghra
 
SQLSecurity.ppt
SQLSecurity.pptSQLSecurity.ppt
SQLSecurity.ppt
LokeshK66
 
SQLSecurity.ppt
SQLSecurity.pptSQLSecurity.ppt
SQLSecurity.ppt
CNSHacking
 
Secure Software Engineering
Secure Software EngineeringSecure Software Engineering
Secure Software Engineering
Rohitha Liyanagama
 
Security vulnerabilities related to web-based data
Security vulnerabilities related to web-based dataSecurity vulnerabilities related to web-based data
Security vulnerabilities related to web-based data
TELKOMNIKA JOURNAL
 
Code injection and green sql
Code injection and green sqlCode injection and green sql
Code injection and green sql
Kaustav Sengupta
 
Web Security - OWASP - SQL injection & Cross Site Scripting XSS
Web Security - OWASP - SQL injection & Cross Site Scripting XSSWeb Security - OWASP - SQL injection & Cross Site Scripting XSS
Web Security - OWASP - SQL injection & Cross Site Scripting XSS
Ivan Ortega
 
GreenSQL Security
 GreenSQL Security GreenSQL Security
GreenSQL Security
ijsrd.com
 
IRJET - SQL Injection: Attack & Mitigation
IRJET - SQL Injection: Attack & MitigationIRJET - SQL Injection: Attack & Mitigation
IRJET - SQL Injection: Attack & Mitigation
IRJET Journal
 
Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020
Moataz Kamel
 
SQL Injection Prevention by Adaptive Algorithm
SQL Injection Prevention by Adaptive AlgorithmSQL Injection Prevention by Adaptive Algorithm
SQL Injection Prevention by Adaptive Algorithm
IOSR Journals
 
IRJET- An Efficient Technique for Finding SQL Injection using Reverse Proxy S...
IRJET- An Efficient Technique for Finding SQL Injection using Reverse Proxy S...IRJET- An Efficient Technique for Finding SQL Injection using Reverse Proxy S...
IRJET- An Efficient Technique for Finding SQL Injection using Reverse Proxy S...
IRJET Journal
 
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
Rana sing
 
Final review ppt
Final review pptFinal review ppt
Final review ppt
Rana sing
 
Study of Web Application Attacks & Their Countermeasures
Study of Web Application Attacks & Their CountermeasuresStudy of Web Application Attacks & Their Countermeasures
Study of Web Application Attacks & Their Countermeasures
idescitation
 
SQLSecurity.ppt
SQLSecurity.pptSQLSecurity.ppt
SQLSecurity.ppt
LokeshK66
 
SQLSecurity.ppt
SQLSecurity.pptSQLSecurity.ppt
SQLSecurity.ppt
CNSHacking
 
Ad

More from IRJET Journal (20)

Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATIONBRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ..."Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer VisionBreast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
FIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACHFIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACH
IRJET Journal
 
Kiona – A Smart Society Automation Project
Kiona – A Smart Society Automation ProjectKiona – A Smart Society Automation Project
Kiona – A Smart Society Automation Project
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based CrowdfundingInvest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUBSPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
IRJET Journal
 
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATIONBRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ..."Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer VisionBreast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
FIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACHFIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACH
IRJET Journal
 
Kiona – A Smart Society Automation Project
Kiona – A Smart Society Automation ProjectKiona – A Smart Society Automation Project
Kiona – A Smart Society Automation Project
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based CrowdfundingInvest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUBSPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
IRJET Journal
 
Ad

Recently uploaded (20)

New Microsoft PowerPoint Presentation.pdf
New Microsoft PowerPoint Presentation.pdfNew Microsoft PowerPoint Presentation.pdf
New Microsoft PowerPoint Presentation.pdf
mohamedezzat18803
 
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptxExplainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
MahaveerVPandit
 
introduction to machine learining for beginers
introduction to machine learining for beginersintroduction to machine learining for beginers
introduction to machine learining for beginers
JoydebSheet
 
Compiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptxCompiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptx
RushaliDeshmukh2
 
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
inmishra17121973
 
Mathematical foundation machine learning.pdf
Mathematical foundation machine learning.pdfMathematical foundation machine learning.pdf
Mathematical foundation machine learning.pdf
TalhaShahid49
 
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdfRICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
MohamedAbdelkader115
 
lecture5.pptxJHKGJFHDGTFGYIUOIUIPIOIPUOHIYGUYFGIH
lecture5.pptxJHKGJFHDGTFGYIUOIUIPIOIPUOHIYGUYFGIHlecture5.pptxJHKGJFHDGTFGYIUOIUIPIOIPUOHIYGUYFGIH
lecture5.pptxJHKGJFHDGTFGYIUOIUIPIOIPUOHIYGUYFGIH
Abodahab
 
Level 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical SafetyLevel 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical Safety
JoseAlbertoCariasDel
 
DSP and MV the Color image processing.ppt
DSP and MV the  Color image processing.pptDSP and MV the  Color image processing.ppt
DSP and MV the Color image processing.ppt
HafizAhamed8
 
Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...
Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...
Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...
Journal of Soft Computing in Civil Engineering
 
theory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptxtheory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptx
sanchezvanessa7896
 
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITYADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ijscai
 
five-year-soluhhhhhhhhhhhhhhhhhtions.pdf
five-year-soluhhhhhhhhhhhhhhhhhtions.pdffive-year-soluhhhhhhhhhhhhhhhhhtions.pdf
five-year-soluhhhhhhhhhhhhhhhhhtions.pdf
AdityaSharma944496
 
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
charlesdick1345
 
Raish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdfRaish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdf
RaishKhanji
 
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Journal of Soft Computing in Civil Engineering
 
Smart_Storage_Systems_Production_Engineering.pptx
Smart_Storage_Systems_Production_Engineering.pptxSmart_Storage_Systems_Production_Engineering.pptx
Smart_Storage_Systems_Production_Engineering.pptx
rushikeshnavghare94
 
new ppt artificial intelligence historyyy
new ppt artificial intelligence historyyynew ppt artificial intelligence historyyy
new ppt artificial intelligence historyyy
PianoPianist
 
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G..."Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
Infopitaara
 
New Microsoft PowerPoint Presentation.pdf
New Microsoft PowerPoint Presentation.pdfNew Microsoft PowerPoint Presentation.pdf
New Microsoft PowerPoint Presentation.pdf
mohamedezzat18803
 
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptxExplainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
MahaveerVPandit
 
introduction to machine learining for beginers
introduction to machine learining for beginersintroduction to machine learining for beginers
introduction to machine learining for beginers
JoydebSheet
 
Compiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptxCompiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptx
RushaliDeshmukh2
 
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
inmishra17121973
 
Mathematical foundation machine learning.pdf
Mathematical foundation machine learning.pdfMathematical foundation machine learning.pdf
Mathematical foundation machine learning.pdf
TalhaShahid49
 
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdfRICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
MohamedAbdelkader115
 
lecture5.pptxJHKGJFHDGTFGYIUOIUIPIOIPUOHIYGUYFGIH
lecture5.pptxJHKGJFHDGTFGYIUOIUIPIOIPUOHIYGUYFGIHlecture5.pptxJHKGJFHDGTFGYIUOIUIPIOIPUOHIYGUYFGIH
lecture5.pptxJHKGJFHDGTFGYIUOIUIPIOIPUOHIYGUYFGIH
Abodahab
 
Level 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical SafetyLevel 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical Safety
JoseAlbertoCariasDel
 
DSP and MV the Color image processing.ppt
DSP and MV the  Color image processing.pptDSP and MV the  Color image processing.ppt
DSP and MV the Color image processing.ppt
HafizAhamed8
 
theory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptxtheory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptx
sanchezvanessa7896
 
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITYADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ijscai
 
five-year-soluhhhhhhhhhhhhhhhhhtions.pdf
five-year-soluhhhhhhhhhhhhhhhhhtions.pdffive-year-soluhhhhhhhhhhhhhhhhhtions.pdf
five-year-soluhhhhhhhhhhhhhhhhhtions.pdf
AdityaSharma944496
 
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
charlesdick1345
 
Raish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdfRaish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdf
RaishKhanji
 
Smart_Storage_Systems_Production_Engineering.pptx
Smart_Storage_Systems_Production_Engineering.pptxSmart_Storage_Systems_Production_Engineering.pptx
Smart_Storage_Systems_Production_Engineering.pptx
rushikeshnavghare94
 
new ppt artificial intelligence historyyy
new ppt artificial intelligence historyyynew ppt artificial intelligence historyyy
new ppt artificial intelligence historyyy
PianoPianist
 
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G..."Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
Infopitaara
 

Prevention of SQL Injection Attack in Web Application with Host Language

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1468 PREVENTION OF SQL INJECTION ATTACK IN WEB APPLICATION WITH HOST LANGUAGE Surabhi Agrawal1, Upendra Singh2 1, 2Lecturer CSE&IT Department Government Engineering College Bharatpur (Raj.), India ---------------------------------------------------------------------***-------------------------------------------------------------------- Abstract: In recent times, internet is widely used in every possible field. Applications used by internet and their databases contain data in secure form but still they can be attached ,SQLIA attacks which is one of the gruesome attack to steal the useful data information from database and malicious attackers will be abletogetunauthorizedaccessto useful data, by attacking the SQL queries ,websites , web applications . The malicious users aim to attack on the input validations by queries which is the most critical part of software security so to prevent input from gruesome attack is valuable and to prevent these types of attack and save our database we used PHP and Java as host language to prevent our query from these attacks. Keywords: - SQL injection, SQLIA, PHP, Java, Query I. INTRODUCTION As now days, the use of internet is spread on wide level in means of broadcasting information, and various online transactions, use of websites for any work , internet is used in every possible field. These applications used by internet and their databases also contain all the data in secure form but still they have sensitive data [1, 2]. The confidentiality of data in database is not proper and so many attacks can be performed on the database in which SQL Injection Attacks known as (SQLIA) is gruesome used attack and it targetedto access the data from database services. As website is used widely over the network, the malicious users attack the website in negative and harm theapplication.SQLIAconsists of attack against web applications and has injection attacks in which attacker targets to modify the structure of SQL query [1, 3]. The changes imposed on SQL query which is placed by client but malicious user modify it by creating a well crafted data to username and password field of web browser without proper validation to get access to the SQL database and access the useful information by pretending the valid user [3]. SQL injection attacks consist of some methods of attacks to maliciously attack database. SQLIA can extract and read confidential or secure data from database or it can modify any data and can also execute some unreliable operations. The database result when expected frommaliciousdatabase or queries gives incorrect or unsolicited result [1]. II. TYPES OF SQL INJECTION ATTACKS There are various methods of attacks present that are used by attacker to extract data and to make attack on queries these methods are classified as follows [1, 2, 3]: 1. Tautology: This method of SQL attack worksonthe injection of tokens to given query statement and it always considered is as true. This attack is mainly used by query with ‘WHERE’ clause. Query for login is [1, 2, 3]: “SELECT * FROM employee WHERE login ID = ‘423’ and password = ‘sss’ OR ‘1’ ‘=’ 1’ Here OR make this statement as tautology (1=1) and the query statement result is always true. 2. Illegal/LogicallyIncorrect Queries: Whena query is given in extra and it is not needed, an error message is displayed fromdatabaseincluding some debugging information. This message displayed sometimes useful for attacker tofindvulnerabilities present in database [1, 2, 3]. Example: SELECT *FROM users WHERE login=’derived’ AND password=password (select host from host) Here the data entered gives irrelevant result and which causes error by which attacker also comes to know about the backend applications which are used. 3. Union Query: In this type of attack the SQL gives permission to two queries to join and return as a one result. In union query attacks, an attacker exploits a given variable from query or it can add some queries by itself to infuse extra information and find out the data from database [1, 2, 3]. Example: Original query: select acc_no from user where u_id=’45’ Injected Query: select acc_no from user where u_id=’45’ UNION select card_no from card_details where u_id=’45’. 4. Piggy – Backed queries: There are many attacks which used in SQLIA in these on is piggy backed in which attacker tries to add malicious query by keeping original query as it is here query is modified by adding some new distinct data in query to extract some more information from database. Here, attackers used one delimiter toaddinoriginal
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1469 query such as “;”, which used to append extra query [1, 2, 3]. Example: SELECT name FROM users WHERE u_id=’35’ AND password=”pass’; droptable users_. 5. Stored Procedures: In this type of attack, the attacker focuses on procedures that are stored in database system which is either user defined or default procedures. Stored procedure is just a code which contains some vulnerability such as buffer overflow [1, 2, 3]. 6. Inference: In this form of attack, the attacker changes the behavior of database and this done by two techniques: blind injection, timing attacks. In BLIND injection type sometimes the data [1, 2, 3] 7. Blind Injection: The normal SQL injection attack is the procedure in which hacker know about the error message that is returned by databaseandrely on it. But in Blind injection attack the hacker need not to see the error message or rely on it so It is called blind injection attack. It described by two forms [1, 2, 3]: Content based blind injection attack: in this the comparison of database queries is based on values ‘TRUE’ or ’FALSE’. Example: SQL statement is SELECT name, price FROM store_table WHERE id= ‘46’ Attacker manipulate it to SELECT name, price FROM store_table WHERE id= ‘46’ and 1=3 Here this will cause the value returnedto be‘FALSE’ and no items displayed on screen. But when the query is SELECT name, price FROM store_table WHERE id= ‘46’ and 1=1 Here this will cause the value returned to be ‘TRUE’ and details of id=34 are shown. And this validates the value of page. Time based blind injection attack: In this type of attack the attacker performs a time intensive operations in which mostly used time based command is “SLEEP” SELECT name, price FROM store_table WHERE id= ‘46’ and if(1=1, sleep(10) , false) This query displayed the result which is delayby10 seconds. III. PREVENTION OF SQL INJECTION ATTACKS USING HOST LANGUAGE PHP/JAVA The SQLIA prevention methods consist of many methods from which data is to make secure by providing algorithms in SQL query. In all these methods one method is by using host language as PHP and Java which is used as a prevention method by inserting some statements to query so it is not accessed by any attacker. 1. PHP AS THE HOST LANGUAGE PHP is a dynamic language which is used in every field now days. And it can also used to prevent SQL attacks [4]. Example: If we enter the query to extract a password for particular id or number by PHP $_name =$_get [‘username’]; $_query = “SELECT password FROM table WHERE name = ‘$_name’”; Here the attacker add new information to extract the user’s information from database in which it adds some extra data as $_name = “data’ OR 1=1--’” $_query = “ SELECT password FROM table WHERE name = ‘$_name’”; Then the result obtained contains $_query = “ SELECT password FROM table WHERE name = ‘data’ OR 1=1--”; HERE this is valid query but it displays the whole passwords of query so it is injected by hacker. To resolve this type of sql injection attacks PHP gives some A. prepared statement : $name = $_get[‘username’] If ($ stmt = $mysqli -> prepare(“SELECT password FROM table WHERE name = ‘$_name’”)){ $stmt->mysqli_bind_param(“s”,$name); $stmt->execute(); $stmt->bind_param($pass); $stmt->fetch(); Printf( “password for user %s is %s n”, $name ,$pass); $stmt->close(); } B. Escaping string: <?php $username = mysqli_real_escape_string($conn,$_post[“username”]);
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1470 $username = mysqli_real_escape_string($conn,$_post[“password”]); mysqli_close($conn); ?> C. Using trim() tags: <?php $username = strip_tags(trim($_post[“usernsame”])); $username strip_tags(trim($_post[“password”])); mysqli_close($conn); ?> 2. JAVA AS THE HOST LANGUAGE Using java as host language the sql injection attacks can be secured by using prepared statements or escape operation or other methods by which data can be secured. Example: Suppose a system wants to succeed or extract some information from database if query returns any result then authentication succeeds otherwise it fails: SELECT *FROMemp_table WHEREusername=‘<username>’ AND password=’<password>’ And in between an attackerinsertssomeoperationtoextract more information from database i.e. SELECT *FROM emp_table WHERE username= ‘<valid>’ OR ‘1’=’1 AND password=’<PASSWORD>’ Here ‘1’=’1 always returns valuetrue whichgivesresultof all rows displays on screen . To remove this in Java we can use prepared statements A. Using prepared statement If we use preparedStatement= “SELECT * FROM emp_table WHERE username = ?”; preparedStatement.setString(1, valid); After this we will be safe and hacker not able to extract our information from backend. The prepared statement works ontheprinciplethat byusing this we can force the user input to be handled as content of a parameter not as the sql command part. But there is a limitation in using prepared statement it works when we do not build our sql command by concatenate two strings here our query is vulnerable to sql attacks [5]. B. Using callableStatement By using callable statement we can also prevent our query from attackers to getinformationfromourdatabaseillegally. It is used as public interface callableStatement extends PreparedStatement The API of java provides SQL Escape command whichallows all the stored procedures to be called in a standard way for all RDBMS. And this syntax is used as syntax of one parameter [6]. IV. CONCLUSION SQLIA is an attacking technique here malicious users input well crafted data to username and password field without proper validation. In this paper the various methods for SQLIA prevention are discussed by using PHP and Java as host language. But with these methods also there is no complete security provided for database. V. REFERENCES [1]. IndraniBalasundaram, Dr. E. Ramaraj “An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service” International Journal of Computer Science andNetwork Security,VOL.11No.1, January 2011, p197-205. [2]. Rashmi Yeole, ShubhangiNinawe, Payal Dhore,Prof.P. U. Tembhare “ A Study on Detection and Preventionof SQL Injection Attack” International Research Journal of Engineering and Technology Volume: 04 Issue: 3 | Mar -2017 p 435-438. [3]. Udit Agarwal, Monika Saxena, Kuldeep SinghRana “A Survey of SQL Injection Attacks” International Journal of Advanced Research in Computer Science and Software Engineering Volume 5, Issue 3, March 2015 p – 286-289. [4]. PHP Manual, The PHP Group, [Available online] at http://php.net/manual/en/security.database.sql- injection.php [Accessed] on 15 November 2017. [5]. Java Documentation, Oracle Inc., [Available online] at https://docs.oracle.com/javase/tutorial/jdbc/basics/ prepared.html [Accessed] on 15 November 2017. [6]. Java Documentation, Oracle Inc., [Available online] at https://docs.oracle.com/javase/7/docs/api/java/sql/ CallableStatement.html [Accessed] on 15 November 2017.