An effective method for preventing SQL injection attack and session hijacking

Karis D'silva, J. Vanajakshi, K. N. Manjunath, Srikanth Prabhu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Abstract

Today's world is very much dependent on the web applications, may it be shopping or financial transactions. Providing security to these web applications isvery important. Most of the transaction information or the customer information is stored in the backend databases for these web applications. One of the vulnerabilities of these web applications is SQL (Structured Query Language) injection attack. Also, the web application sessions are prone to session hijacking attack, if the adversary can get hold of the session id. Considering that there are various tools available to retrieve session/HTTP cookies, this makes web applications very vulnerable session hijacking attacks. Though there are many ways proposed to defend the databases against SQL injection attacks, there is no sure shot way to prevent these SQL injection attacks. This project proposes an efficient technique for the prevention of SQL injection attack and session hijacking. The hashing technique is used for implementing the preventionthese attacks.

Original languageEnglish
Title of host publicationRTEICT 2017 - 2nd IEEE International Conference on Recent Trends in Electronics, Information and Communication Technology, Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages697-701
Number of pages5
Volume2018-January
ISBN (Electronic)9781509037049
DOIs
Publication statusPublished - 12-01-2018
Event2nd IEEE International Conference on Recent Trends in Electronics, Information and Communication Technology, RTEICT 2017 - Bangalore, India
Duration: 19-05-201720-05-2017

Conference

Conference2nd IEEE International Conference on Recent Trends in Electronics, Information and Communication Technology, RTEICT 2017
CountryIndia
CityBangalore
Period19-05-1720-05-17

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Computer Science Applications
  • Media Technology
  • Control and Optimization
  • Instrumentation
  • Transportation
  • Communication

Fingerprint Dive into the research topics of 'An effective method for preventing SQL injection attack and session hijacking'. Together they form a unique fingerprint.

Cite this