Security in web applications: a comparative analysis of key SQL injection detection techniques
Conference paper
Veerabudren, K. and Bekaroo, G. 2022. Security in web applications: a comparative analysis of key SQL injection detection techniques. 4th International Conference on Emerging Trends in Electrical, Electronic and Communications Engineering (ELECOM). Mauritius 22 - 24 Nov 2022 IEEE. https://doi.org/10.1109/elecom54934.2022.9965264
Type | Conference paper |
---|---|
Title | Security in web applications: a comparative analysis of key SQL injection detection techniques |
Authors | Veerabudren, K. and Bekaroo, G. |
Abstract | Over the years, technological advances have driven massive proliferation of web systems and businesses have harbored a seemingly insatiable need for Internet systems and services. Whilst data is considered as a key asset to businesses and that their security is of extreme importance, there has been growing cybersecurity threats faced by web systems. One of the key attacks that web applications are vulnerable to is SQL injection (SQLi) attacks and successful attacks can reveal sensitive information to attackers or even deface web systems. As part of SQLi defence strategy, effective detection of SQLi attacks is important. Even though different techniques have been devised over the years to detect SQLi attacks, limited work has been undertaken to review and compare the effectiveness of these detection techniques. As such, in order to address this gap in literature, this paper performs a review and comparative analysis of the different SQLi detection techniques, with the aim to detect SQLi attacks in an effective manner and enhance the security of web applications. As part of the investigation, seven SQLi detection techniques including machine learning based detection are reviewed and their effectiveness against different types of SQLi attacks are compared. Results identified positive tainting and adoption of machine learning among the most effective techniques and stored procedures based SQLi as the most challenging attack to detect. |
Keywords | SQL injection attacks; detection techniques; comparative analysis; SQLi; SQLia; web applications; cybersecurity |
Sustainable Development Goals | 9 Industry, innovation and infrastructure |
Middlesex University Theme | Creativity, Culture & Enterprise |
Conference | 4th International Conference on Emerging Trends in Electrical, Electronic and Communications Engineering (ELECOM) |
Proceedings Title | 2022 4th International Conference on Emerging Trends in Electrical, Electronic and Communications Engineering (ELECOM) |
ISBN | |
Electronic | 9781665466974 |
Electronic | 9781665466967 |
Paperback | 9781665466981 |
Publisher | IEEE |
Publication dates | |
22 Nov 2022 | |
Online | 01 Dec 2022 |
Publication process dates | |
Deposited | 15 Dec 2022 |
Accepted | 15 Sep 2022 |
Output status | Published |
Accepted author manuscript | |
Copyright Statement | © 2022 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. |
Digital Object Identifier (DOI) | https://doi.org/10.1109/elecom54934.2022.9965264 |
Web address (URL) of conference proceedings | https://ieeexplore.ieee.org/xpl/conhome/9964478/proceeding |
Language | English |
https://repository.mdx.ac.uk/item/8q318
Download files
53
total views63
total downloads0
views this month0
downloads this month