0% found this document useful (0 votes)
152 views2 pages

Seminar Abstract

SQL injection attacks pose a serious security threat by allowing attackers to access sensitive database information. Researchers have proposed many solutions, but they often only address some types of SQL injection attacks. This document presents an extensive review of different SQL injection attack types and existing detection and prevention techniques, discussing the strengths and weaknesses of each technique in addressing the full scope of SQL injection attacks. It also contains information about SQL injection, one of the most common database attacks, explaining how attackers can gain unauthorized access to restricted data and potentially control over web applications and servers.

Uploaded by

Sanal Sudhakaran
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
152 views2 pages

Seminar Abstract

SQL injection attacks pose a serious security threat by allowing attackers to access sensitive database information. Researchers have proposed many solutions, but they often only address some types of SQL injection attacks. This document presents an extensive review of different SQL injection attack types and existing detection and prevention techniques, discussing the strengths and weaknesses of each technique in addressing the full scope of SQL injection attacks. It also contains information about SQL injection, one of the most common database attacks, explaining how attackers can gain unauthorized access to restricted data and potentially control over web applications and servers.

Uploaded by

Sanal Sudhakaran
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

SEMINAR ABSTRACT

ON
SQL INJECTION








Submitted By,
Sanal.S
S5MCA.A
Roll No: 43
ABSTRACT

SQL injection attacks pose a serious security threat to Web applications:
they allow attackers to obtain unrestricted access to the databases underlying the
applications and to the potentially sensitive information these databases contain. Although
researchers and practitioners have proposed various methods to address the SQL injection
problem, current approaches either fail to address the full scope of the problem or have
limitations that prevent their use and adoption. Many researchers and practitioners are
familiar with only a subset of the wide range of techniques available to attackers who are
trying to take advantage of SQL injection vulnerabilities. As a consequence, many solutions
proposed in the literature address only some of the issues related to SQL injection. To
address this problem, we present an extensive review of the different types of SQL injection
attacks known to date. For each type of attack, we provide descriptions and examples of
how attacks of that type could be performed. We also present and analyze existing detection
and prevention techniques against SQL injection attacks. For each technique, we discuss
its strengths and weaknesses in addressing the entire range of SQL injection attacks.

This paper contains information about this extremely popular database
attack. Most of today's web applications require dynamic content and input from users to
achieve the same appeal as traditional applications within the desktop operating
systems. This is achieved by using languages such as SQL the most common being
MySQL. The attacker can gain unauthorized access to restricted data such as
usernames /passwords/email addresses etc. Using SQL injections, attackers can: Add new
data to the database. With some more advanced queries and tricky techniques the attacker
can potentially bypass the authentication and gain complete control over the web
application and potentially the web server. Perform an INSERT in the injected SQL-
Modify data currently in the database. Perform an UPDATE in the injected SQL - Often
can gain access to other users system capabilities by obtaining their password. Could be
embarrassing to find yourself selling politically incorrect items on an e-Commerce site.

You might also like