Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.

QUESTION

You will prepare and submit a term paper on Methods of Identifying and Preventing SQL Attacks. Your paper should be a minimum of 1250 words in length.

You will prepare and submit a term paper on Methods of Identifying and Preventing SQL Attacks. Your paper should be a minimum of 1250 words in length. In this case, the paper will discuss issues related to the detection and prevention of SQL attacks.

Commercial and governmental institutions are the common victims of SQL Injection Attacks (SQLIAs), due to the insufficiency in the input validation. In fact, these cases occur when a Web application receives a user input, thus using it for building a database query without ample validation, hence creating a chance for an attacker to utilize the vulnerability. The vulnerability of the databases to SQL injections has been regarded as the most serious threat to a Web application (Wassermann and Su, 78). This creates a form of vulnerability to SQL injection, thus allowing the attacker to have accessibility to the underlying databases, and it results in security violations since the information in these databases is sensitive. The implications of SQL injections are issues like loss of credentials, theft, and fraud, and in other cases, the attackers are able to use the vulnerability to acquire control and corrupt the system hosting the Web application.

Numerous methods can be applied in detecting SQL injection attacks, and one of them is the Intrusion Detection System (IDS), which is based on a machine learning technique and application of a set of distinctive application queries. Moreover, this technique relates to a model of distinctive queries and a function of monitoring application at runtime in order to identify the queries that are not matching the model (Pietraszek and Vanden, 2). Therefore, this makes the system behave the ability to detect attacks effectively, though there are basic demerits of learning-based techniques since does not offer a guarantee concerning the detection abilities. In fact, the detection abilities are dependent on the quality of the training set applied. thus, a poor training set can result to generate large numbers of false-positive and negative by the learning technique (Valeur, Mutz, and Vigna, 40).

The other way of detecting the SQL injection attacks is through the Taint Based Approach, which uses the WebSSARI for the detection of input-validation concerning the errors through an analysis of the information flow.

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question