Security

Deployment of Reverse Proxy for the Mitigation of SQL Injection Attacks Using Input-Data Cleansing Algorithm

Free registration required

Executive Summary

Internet has eased the life of human in numerous ways, but the drawbacks like the intrusions that are attached with the Internet applications sustains the growth of these applications. Hackers find new methods to intrude the applications and the web application vulnerability reported is increasing year after year. One such major vulnerability is the SQL Injection Attacks (SQLIA). Since SQLIA contributes 25% of the total Internet attacks, much research is being carried out in this area. In this paper, the authors propose a method to detect the SQL injection. They deploy a Reverse proxy that uses the input-data cleansing algorithm to mitigate SQL Injection Attack.

  • Format: PDF
  • Size: 694.7 KB