Abstract
Web application plays an important role in individual life as well as in any country’s development. Web application has gone through a rapid growth in the recent years and their adaptation is moving faster than that was expected few years ago. Web based applications constitute various types of attacks, in that SQL injection is the worst threat which exploits the most web based applications. It is done by injecting the SQL statements as an input string to gain an unauthorized access to a database. However, in previous system the injection gives an access to some unauthorized users because the development of different approaches to prevent SQL injection still remains an alarming threat to web application. To address this problem an extensive review on different types of SQL injection attacks are presented in this paper. The web intrusion detection system is focused in this paper for threat detection and prevention by using renowned datasets. The strength and weakness of the entire range of SQL injection is estimated by addressing with mathematical models.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Ruse, M., Sarkar, T., Basu. S.: Analysis and detection of SQL injection vulnerabilities via automatic test case generation of programs. In: Proceedings of 10th Annual International Symposium on Applications and the Internet, pp. 31–37, 2010
Tajpour, A., Masrom, M., Heydari, M.Z., Ibrahim, S.: SQL injection detection and prevention tools assessment. In: Proceedings of the 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT’10), pp. 518–522, 9–11 July 2010
Bhoria, M.P., Garg, K.: Determining feature set of Dos attacks. Int. J. Adv. Res. Comput Sci. Softw. Eng. 3(5), (2013)
Panda, S., Ramani, S.: Protection of web application against SQL injection attacks. Int. J. Mod. Eng. Res. (IJMER) 3, 166−168 (2013) ISSN 2249-6645
Beniwal, S., Arora, J.: Classification and feature selection techniques in data mining. Int. J. Eng. Res. Technol. 1(6) (2012)
Zhao, S., Tsang, E.C.C., Chen, D., Wang, X.: Building a rule-based classifier—a fuzzy-rough set approach. IEEE Trans. Knowl. Data Eng. 22(5), 624–638 (2010)
Acampora, G., Loia, V.: On the temporal granularity in fuzzy cognitive maps. IEEE Trans. Fuzzy. Syst. (June 2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Maheswari, K.G., Anita, R. (2016). An Intelligent Detection System for SQL Attacks on Web IDS in a Real-Time Application. In: Vijayakumar, V., Neelanarayanan, V. (eds) Proceedings of the 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC – 16’). Smart Innovation, Systems and Technologies, vol 49. Springer, Cham. https://doi.org/10.1007/978-3-319-30348-2_8
Download citation
DOI: https://doi.org/10.1007/978-3-319-30348-2_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-30347-5
Online ISBN: 978-3-319-30348-2
eBook Packages: EngineeringEngineering (R0)