SQLIPA: An Authentication Mechanism Against SQL Injection
#1

Abstract
Web application has been developed with very rapid progress. Web applications use
database at backend for storing data and SQL for insertion and retrieval of data. There are
some malicious attacks which can deceive this SQL. These attacks are called SQL
injection. To stop SQL injection many techniques have been proposed but they require
large code modification and/or large extra time overhead. The work of this paper proposes
a technique using hash values of user name and password, to improve the authentication
process. We had built a prototype, SQL Injection Protector for Authentication (SQLIPA),
for the evaluation of idea.
Keywords: Database security, SQL injection, Authentication
1. Introduction
In Today’s world of ubiquities computing every person remains connected to the internet. In these
situations the web security is very necessary and it is a challenging part of the web applications(A.
Kiezun and Ernst 2009). A number of techniques are in use for securing the web applications. The
most common way is the authentication process through the username and password. One of the major
problems in the authentication process is the input validation checking (Boyd and Keromytis 2004; K.
Wei and Kothari 2006; R. Ezumalai 2009). There are some major threads in web application security
for example SQL injection and Buffer overflow which can break the web application security (Geer
2008).
SQLIPA: An Authentication Mechanism Against SQL Injection 605
SQL injection is too much vulnerable that it can bypass many traditional security layers like
Firewall, encryption, and traditional intrusion detection systems(R. Ezumalai 2009). It can also bypass
the database mechanisms of authentication and authorization (A. Kamra and Guy 2008)
SQL injection can not only be used for violating the security by seeing the private data of the
people but also can be used for bypassing the authentication of user which is a big flaw in the web
applications.
Major problem in the web applications vulnerabilities is the SQL injection. It is to be
considered that SQL injection is an easy attack and every developer can easily do the SQL injection
which is the most worrying aspect of the SQL injection (R. Ezumalai 2009).
Login page is the most complicated web application which allows users to enter into the
database after authenticating him. In this page, the user provides his identity like username and
password. There might be some invalid input validations which can bypass the authentication process
using some mechanism like SQL injection (Palmer 2007).
Normally, web applications is a three tier architecture, the Application tier at the user side,
Middle tier which converts the user queries into the SQL format, and the backend database server
which stores the user data as well as the user’s authentication table. Whenever a user wants to enter
into the web database through application tier, the user inputs his/her authentication information from a
login form as shown in figure 1.

Download full report
http://eurojournalsejsr_38_4_11.pdf
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: wasp against sql injection attacks in java, authentication bypass using sql injection image, protecting against sql injection, sqlipa an authentication mechanism against sql injection, authentication bypass using sql injection, protection against sql injection, who is pattie boyd,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Graphical Password Authentication using Cued Click Points (CCP) project topics 19 18,554 26-04-2017, 03:38 PM
Last Post: jaseela123d
  Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper 1 801 15-02-2017, 11:01 AM
Last Post: jaseela123d
  Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper 1 764 15-02-2017, 11:00 AM
Last Post: jaseela123d
  A New Cell-Counting-Based Attack against Tor 1 723 14-02-2017, 11:26 AM
Last Post: ijasti
  Data Hiding in Binary Images for Authentication & Annotation project topics 2 1,836 06-11-2015, 02:27 PM
Last Post: seminar report asees
  Revisiting Defenses against Large-Scale Online Password Guessing Attacks Projects9 5 3,930 18-03-2013, 12:25 PM
Last Post: computer topic
  PREVENTION OF SQL INJECTION AND DATA THEFTS USING DIVIDE AND CONQUER APPROACH seminar presentation 3 4,180 24-10-2012, 01:09 PM
Last Post: seminar details
  Project Report on IPAS: Implicit Password Authentication System computer girl 0 2,105 08-06-2012, 11:27 AM
Last Post: computer girl
  ZIGBEE WIRELESS VEHICLE IDENTIFICATION AND AUTHENTICATION SYSTEM full report project topics 11 7,824 13-03-2012, 11:06 AM
Last Post: seminar paper
  MABS: Multicast Authentication Based on Batch Signature seminar class 15 10,359 29-02-2012, 10:06 AM
Last Post: seminar paper

Forum Jump: