About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Broadband Communications, Networks, and Systems. 14th EAI International Conference, BROADNETS 2024, Hyderabad, India, February 16–17, 2024, Proceedings, Part II

Research Article

Database Under Siege: The Hidden Menace of SQL Injection Attacks

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-81171-5_15,
        author={Rajitha Ala and Attili Venkata Ramana and Vasantha Sandhya Venu and Kiranmai Bejjam and Sai Sriharsha Kanagala and Bheemeshwar Punyamurthy and Ruchitha Sangeam},
        title={Database Under Siege: The Hidden Menace of SQL Injection Attacks},
        proceedings={Broadband Communications, Networks, and Systems. 14th EAI International Conference, BROADNETS 2024, Hyderabad, India, February 16--17, 2024, Proceedings, Part II},
        proceedings_a={BROADNETS PART 2},
        year={2025},
        month={2},
        keywords={Vulnerability assessment Parameterized queries Intercept Repeater cookies},
        doi={10.1007/978-3-031-81171-5_15}
    }
    
  • Rajitha Ala
    Attili Venkata Ramana
    Vasantha Sandhya Venu
    Kiranmai Bejjam
    Sai Sriharsha Kanagala
    Bheemeshwar Punyamurthy
    Ruchitha Sangeam
    Year: 2025
    Database Under Siege: The Hidden Menace of SQL Injection Attacks
    BROADNETS PART 2
    Springer
    DOI: 10.1007/978-3-031-81171-5_15
Rajitha Ala1,*, Attili Venkata Ramana2, Vasantha Sandhya Venu1, Kiranmai Bejjam1, Sai Sriharsha Kanagala1, Bheemeshwar Punyamurthy1, Ruchitha Sangeam1
  • 1: Department of CSE
  • 2: Department of CSE-Data Science
*Contact email: rajitha.it222@gmail.com

Abstract

The report begins by providing a detailed explanation of SQL injection attacks, illustrating how attackers exploit vulnerabilities in application code to inject malicious SQL queries. Attackers use various methods to bypass security and access data. In addition, the report delves into the underlying causes that make databases susceptible to SQL injection attacks, including poor input validation, lack of parameterized queries, and inadequate access controls. It highlights the importance of secure coding practices and ongoing vulnerability assessments as proactive measures to mitigate risk. To address this growing menace, the report explores a range of defense strategies and best practices. It discusses the implementation of robust input validation techniques, the utilization of parameterized queries, and the adoption of web application firewalls. Furthermore, it emphasizes the significance of educating developers, administrators, and users about SQL injection risks and the adoption of a security-first mindset.

Keywords
Vulnerability assessment Parameterized queries Intercept Repeater cookies
Published
2025-02-07
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-81171-5_15
Copyright © 2024–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL