DEPLOYMENT OF REVERSE PROXY FOR THE MITIGATION OF SQL INJECTION ATTACKS USING INPUT-DATA CLEANSING ALGORITHM
DEPLOYMENT OF REVERSE PROXY FOR THE MITIGATION OF SQL
INJECTION ATTACKS USING INPUT-DATA CLEANSING ALGORITHM
S. Fouzul Hidhaya1, 2 and Angelina
Geetha1, 3
1
Department of Computer science and Engineering, B.S. Abdur Rahman University,
Chennai, Tamilnadu, India.
ABSTRACT
Internet has eased the life of human in numerous
ways, but the drawbacks like the intrusions that are attached with the Internet
applications sustains the growth of these applications. Hackers find new
methods to intrude the applications and the web application vulnerability
reported is increasing year after year. One such major vulnerability is the SQL
Injection attacks (SQLIA). Since SQLIA contributes 25% of the total Internet
attacks, much research is being carried out in this area. In this paper we
propose a method to detect the SQL injection. We deploy a Reverse proxy that
uses the input-data cleansing algorithm to mitigate SQL Injection Attack. This
system has been tested on standard test bed applications and our work has shown
significant improvement in detecting and curbing the SQLIA.
KEYWORDS
SQL
Injection, SQL attack, Security threats, Web application vulnerability.
SOURCE URL
VOLUME URL
Comments
Post a Comment