Skip to main content

An Intelligent Detection System for SQL Attacks on Web IDS in a Real-Time Application

  • Conference paper
  • First Online:

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 49))

Abstract

Web application plays an important role in individual life as well as in any country’s development. Web application has gone through a rapid growth in the recent years and their adaptation is moving faster than that was expected few years ago. Web based applications constitute various types of attacks, in that SQL injection is the worst threat which exploits the most web based applications. It is done by injecting the SQL statements as an input string to gain an unauthorized access to a database. However, in previous system the injection gives an access to some unauthorized users because the development of different approaches to prevent SQL injection still remains an alarming threat to web application. To address this problem an extensive review on different types of SQL injection attacks are presented in this paper. The web intrusion detection system is focused in this paper for threat detection and prevention by using renowned datasets. The strength and weakness of the entire range of SQL injection is estimated by addressing with mathematical models.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Ruse, M., Sarkar, T., Basu. S.: Analysis and detection of SQL injection vulnerabilities via automatic test case generation of programs. In: Proceedings of 10th Annual International Symposium on Applications and the Internet, pp. 31–37, 2010

    Google Scholar 

  2. Tajpour, A., Masrom, M., Heydari, M.Z., Ibrahim, S.: SQL injection detection and prevention tools assessment. In: Proceedings of the 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT’10), pp. 518–522, 9–11 July 2010

    Google Scholar 

  3. Bhoria, M.P., Garg, K.: Determining feature set of Dos attacks. Int. J. Adv. Res. Comput Sci. Softw. Eng. 3(5), (2013)

    Google Scholar 

  4. Panda, S., Ramani, S.: Protection of web application against SQL injection attacks. Int. J. Mod. Eng. Res. (IJMER) 3, 166−168 (2013) ISSN 2249-6645

    Google Scholar 

  5. Beniwal, S., Arora, J.: Classification and feature selection techniques in data mining. Int. J. Eng. Res. Technol. 1(6) (2012)

    Google Scholar 

  6. Zhao, S., Tsang, E.C.C., Chen, D., Wang, X.: Building a rule-based classifier—a fuzzy-rough set approach. IEEE Trans. Knowl. Data Eng. 22(5), 624–638 (2010)

    Article  Google Scholar 

  7. Acampora, G., Loia, V.: On the temporal granularity in fuzzy cognitive maps. IEEE Trans. Fuzzy. Syst. (June 2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. G. Maheswari .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Maheswari, K.G., Anita, R. (2016). An Intelligent Detection System for SQL Attacks on Web IDS in a Real-Time Application. In: Vijayakumar, V., Neelanarayanan, V. (eds) Proceedings of the 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC – 16’). Smart Innovation, Systems and Technologies, vol 49. Springer, Cham. https://doi.org/10.1007/978-3-319-30348-2_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-30348-2_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-30347-5

  • Online ISBN: 978-3-319-30348-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics