UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 4 | April 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 7 Issue 4
April-2020
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR2004051


Registration ID:
230435

Page Number

346-349

Share This Article


Jetir RMS

Title

Detection and Prevention of SQLI Attacks inside the DBMS

Abstract

Database applications are used to store, search, sort, calculate, report and share information. Databases can also contain code to perform mathematical and statistical calculations on the data to support queries submitted by users. The grocery store, bank, video rental store and clothing store all use databases to keep track of customer, inventory, employee and accounting information. SQL injection is a code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution. The most common cause of database vulnerabilities is a lack of due care at the moment they are deployed. The effectiveness of such attacks stems from semantic mismatch between how SQL queries are believed to be executed and the way in which database processes them. In this paper, a technique is proposed which provides external as well as internal security to the database. SEPTIC(Self Protecting mechanism), a mechanism for DBMS attack prevention, which can also assist on the identification of the vulnerabilities in the applications is combined with Naive Bayes a Machine Learning algorithm to achieve accurate results. This technique will be implemented using MySQL database. In this paper an attempt has been made to develop an online shop that allows users to check for different clothing stuff. To enhance the security all the user details such as name, password and card details will be encrypted using AES algorithm and then stored in the database.

Key Words

DBMS self-protection, injection attacks, Database Security, SQL injection technique, Attack detection, Attack prevention, AES Algorithm, Encryption.

Cite This Article

"Detection and Prevention of SQLI Attacks inside the DBMS", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.7, Issue 4, page no.346-349, April-2020, Available :http://www.jetir.org/papers/JETIR2004051.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Detection and Prevention of SQLI Attacks inside the DBMS", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.7, Issue 4, page no. pp346-349, April-2020, Available at : http://www.jetir.org/papers/JETIR2004051.pdf

Publication Details

Published Paper ID: JETIR2004051
Registration ID: 230435
Published In: Volume 7 | Issue 4 | Year April-2020
DOI (Digital Object Identifier):
Page No: 346-349
Country: -, -, - .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0003014

Print This Page

Current Call For Paper

Jetir RMS