Grin logo
de en es fr
Boutique
GRIN Website
Publier des textes, profitez du service complet
Aller à la page d’accueil de la boutique › Informatique - Informatique appliquée

SQL injection attacks and mitigations

Computer application security capstone project

Titre: SQL injection attacks and mitigations

Travail de Projet (scientifique-pratique) , 2018 , 22 Pages , Note: 3.91/4

Autor:in: Tanmay Teckchandani (Auteur)

Informatique - Informatique appliquée
Extrait & Résumé des informations   Lire l'ebook
Résumé Extrait Résumé des informations

Structured Query Language Injection is one of the vulnerabilities in OSWAP Top 10 list for web-based application exploitation. In this study, we will be demonstrating the different methods of SQL injection attacks and prevention techniques will be illustrated.

Web application are widespread as they have become the necessity for the everyday life. Most web-based applications communicate with a database using a machine-understandable language called Structured Query Language (SQL).

SQL injection is a code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted from the client of the application.

Extrait


Table of Contents

INTRODUCTION

PROBLEM STATEMENT

SIGNIFICANCE

RESOURCES

SUMMARY: WEB SEARCH AND LITERATURE

METHODOLOGY

RESULTS AND DISCUSSION

CONCLUSION AND RECOMMENDATIONS

SUMMARY

Objectives and Topics

This capstone project aims to provide a comprehensive analysis of SQL injection vulnerabilities in web applications, demonstrating how such attacks are executed and evaluating effective mitigation strategies to secure database layers.

  • Analysis of SQL injection attack vectors and their potential impact on data confidentiality and integrity.
  • Examination of real-world security breaches and historical data loss attributed to SQL injection.
  • Practical demonstration of attack techniques on a vulnerable web application prototype.
  • Development and comparison of three distinct mitigation strategies: Parameterized Queries, Stored Procedures, and Input Validation.

Excerpt from the Book

METHODOLOGY

Most of the web search in significance section shows that web applications were attacked by performing SQL injection from their login panel or a panel which has to do with user input. The organization who were the victim of SQL injection suffered huge amount of data breach and some organizations data were dumped and some companies suffered huge financial loss. We are doing research on this topic to spread awareness among web developers and people with less knowledge of SQL injection. So, that web application with databases which contains confidential data can be prevented in coming future. As, data is the most crucial asset to protect.

Databases are the main target for hackers because database contains sensitive information. Therefore, databases are often targeted for acquiring sensitive information by performing SQL injection attack which is listed number one in OWASP top ten list of web application security risk. This section is focused upon which methods we will use to demonstrate SQL injection attack and different approaches for mitigating SQL injection vulnerability.

We will be developing one simple website which will has username and password as textbox, one login button and sign up button. When user logs in to website using credentials he/she will be redirected to welcome page with some user details. When a new user wants to sign up he/she will sign up and information of that user will be stored in database. This website will be vulnerable to SQL injection attack and we will show how this web-site can be attacked using SQL injection to gain access to any user’s account, deleting tables in database, inserting records, showing application errors from which information about database can be obtained. Then, we will develop three web-sites which has same design as described above but each web-site will have different approach to mitigate SQL injection vulnerability.

Summary of Chapters

INTRODUCTION: Provides a foundational overview of SQL injection as a critical web vulnerability and defines the scope of the study.

PROBLEM STATEMENT: Outlines the goal of increasing public awareness regarding SQL injection and the risks it poses to sensitive organizational data.

SIGNIFICANCE: Explores the historical progression and severe real-world consequences of SQL injection attacks on various high-profile entities.

RESOURCES: Specifies the technical environment, utilizing C# ASP.NET and MS SQL Server, chosen for the practical demonstrations.

SUMMARY: WEB SEARCH AND LITERATURE: Synthesizes recent industry reports and research regarding the evolution of SQL injection techniques and common impacts.

METHODOLOGY: Details the practical approach of building a vulnerable website and implementing three distinct defense mechanisms.

RESULTS AND DISCUSSION: Documents the performance of the proposed mitigation techniques and the challenges faced during development.

CONCLUSION AND RECOMMENDATIONS: Synthesizes the findings and advocates for a combined approach of stored procedures and input validation for optimal security.

SUMMARY: Recaps the project's purpose, research process, and the effectiveness of the proposed security models.

Keywords

SQL Injection, Web Application Security, OWASP, Cybersecurity, Database Protection, Parameterized Query, Stored Procedure, Input Validation, Data Breach, ASP.NET, Vulnerability Assessment, Software Security, Authentication, Authorization, Integrity.

Frequently Asked Questions

What is the core focus of this research paper?

This project focuses on the mechanics of SQL injection attacks and explores practical, technical solutions to mitigate these vulnerabilities in web-based applications.

What are the primary themes discussed?

The core themes include the identification of SQL injection risks, the historical analysis of significant data breaches, and the comparative evaluation of various defensive coding practices.

What is the ultimate goal of the project?

The primary goal is to educate developers and users about the dangers of SQL injection and to demonstrate how implementing secure coding techniques can effectively protect database-driven web applications.

Which scientific methods were employed?

The author utilized an empirical research approach by creating a vulnerable web application prototype and subjecting it to various SQL injection attacks, followed by testing three specific mitigation methodologies.

What topics are covered in the main body?

The main body covers the identification of vulnerabilities, the demonstration of successful attacks (such as unauthorized login and data deletion), and the step-by-step implementation of three defenses: parameterized queries, stored procedures, and input validation.

How is this paper characterized by keywords?

The paper is characterized by terms related to application security, specifically focusing on database protection strategies like input validation and parameterized queries to prevent exploitation.

Why did the author choose C# ASP.NET for the demonstrations?

The author opted for C# ASP.NET and MS SQL Server because these technologies are widely adopted by organizations globally, making the findings highly relevant for most developers.

What is the suggested "best practice" for preventing SQL injection according to the conclusion?

The author recommends a mixed approach, combining stored procedures for efficient data logic and input validation to restrict harmful characters at the client-side level, creating a layered defense strategy.

Fin de l'extrait de 22 pages  - haut de page

Résumé des informations

Titre
SQL injection attacks and mitigations
Sous-titre
Computer application security capstone project
Note
3.91/4
Auteur
Tanmay Teckchandani (Auteur)
Année de publication
2018
Pages
22
N° de catalogue
V461503
ISBN (ebook)
9783668944985
ISBN (Livre)
9783668944992
Langue
anglais
mots-clé
computer
Sécurité des produits
GRIN Publishing GmbH
Citation du texte
Tanmay Teckchandani (Auteur), 2018, SQL injection attacks and mitigations, Munich, GRIN Verlag, https://www.grin.com/document/461503
Lire l'ebook
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
Extrait de  22  pages
Grin logo
  • Grin.com
  • Expédition
  • Contact
  • Prot. des données
  • CGV
  • Imprint