A System For The Prevention of SQL Injection Attacks: Spring 2023
A System For The Prevention of SQL Injection Attacks: Spring 2023
A System For The Prevention of SQL Injection Attacks: Spring 2023
Rasha Alqahtani
Ra17@hood.edu
Spring 2023
1.Research Problem
In cybersecurity, SQL injection attacks lead to data integrity, availability, and authentication
issues. It is the exploitation of databases. In 2021, SQL injections were third most serious
cybersecurity risk. There are 274000 SQL injection attacks that occurred this year. These attacks
are technology which compromises the backend infrastructure. According to NIST Computer
Security Division, Information Technology Laboratory, there are thousands of security vulnerabilities
related to SQL injections as an example is shown in fig 1.1.
Fig 1.1
2.Assumptions
In cybersecurity field, security assumptions often lead to false positives. But SQL injection is an
OSI model layer 7 attack. Such attacks are the cause of massive breakdown of security systems.
The following are some journals related to SQL injection attacks.
SQL Injection Attacks Prevention System by Fairoz Q.Kareem[0]
Review of SQL Injection: Problems and Prevention Mohd Amin Mohd Yunus#, Muhammad
Zainulariff Brohan#, Nazri Mohd Nawi #, Ely Salwana Mat Surin*, Nurhakimah Azwani Md
Najib#, Chan Wei Liang# [1]
3.Abstract
In this paper, we are reviewing the methodology used in SQL injection attacks and their
prevention. In today's world, SQL Injection is a serious security threat over the Internet for the
various dynamic web applications residing over the internet. These Web applications conduct
many vital processes in various web-based businesses. This paper outlines the impact of such
attacks and gives solutions to prevent them.
The vulnerabilities in most web applications enable hackers to gain access to confidential and
confidential information. Structured query injection poses a significant threat to web
applications and is one of the most common and widely used information theft mechanisms.
Where hackers benefit from errors in the design of systems or existing gaps by not filtering the
user's input for some special characters and symbols contained within the structural query
sentences or the quality of the information is not checked whether it is text or numerical, which
causes unpredictability of the outcome of its implementation. In this paper, we review PHP
techniques and other techniques for protecting SQL from the injection, methods for detecting
SQL attacks, types of SQL injection, causes of SQL injection via getting and Post, and prevention
technology for SQL vulnerabilities
4.Introduction
A SQL injection is a technique that attackers use to compromise the database security of target
system. These are the oldest and most common techniques that can be very destructive. The
prevention of such attacks is done through input validation and parameterized queries and
statements. The application code should never use the input directly. All the inputs should be
sanitized properly.
Website applications play an essential part in daily life in today's technology-driven world.
People use websites for various purposes, including internet shopping, banking, and chatting
with friends. Often, websites use databases to store user data on the backend [1]. Since
sensitive information, including passwords, credit card numbers, and social security numbers, is
kept in such files, malicious hackers often attack them [2-4]. According to an analysis of
numerous hacking events, when operating system security improves and security protection
software and hardware solutions become more widespread, network attacks directly triggered
by operating system vulnerabilities decrease year after year, while the usage rate of WEB
application system vulnerabilities increases. Because of its easy syntax and high development
performance, Python has become the language of choice for developing all types of portal
websites and Web application programs. Django architecture is a python language
development environment with fast speed, high compatibility, free open source, and other
benefits [5]. Based on the current traffic levels, about 70% of the Django architecture relies on
the present-day network conditions [6]. Since the Python early design process is over-efficient
and transparent, some necessary security specifications in the programming language are not
strictly restricted [7]. Adding delicate data is needed. It is counterproductive because the
programmer lacks their security knowledge while the machine functions are jeopardized [8].
5.Research Questions
The following are some of the questions on SQL injection prevention system:
6.Expected Outcome
The SQL injection prevention system will be helpful to prevent the attacks. The following
outcome will come:
7.Project Plan
There will be a web-app containing python as a backend. The website would have log-in and
sign-in forms to get onto the website. There will be a database of users. The SQL queries will be
designed according to the following techniques to prevent SQL injection. The different methods
are used to prevent attacks:
Fig 7.1
Vulnerability Testing
After designing the database and configuring the web app, the SQL injection attacks will be
carried out onto the web-app. The attacks will be used to know how secure the system against
SQL injection attacks is.
The following malicious tricks will be brute forced to show SQL injection vulnerabilities:
Login injection
Union injection
Bypassing Login Screens
Bulk insert
Then some tools will also be used to carry out the SQL injection attacks as followings:
References
[1] Asian Journal of Research in Computer Science
10(3): 13-32, 2021; Article no. AJRCOS.70376
ISSN: 2581-8260
[2] INTERNATIONAL JOURNAL ON INFORMATICS VISUALIZATION
[8] Stobart S. Vassileiou M. "MySQL database and PHPMy admin installation," in PHP and
MySQL Manual, ed.
[9] Abdullah RM, Ameen SY, Ahmed DM, Kak SF, Yasin HM, Ibrahim IM, et al.