X-Log Authentication Technique to Prevent SQL Injection Attacks
Source: Kurukshetra University
Recent laws governing data privacy have led to great interest in enabling secure database services. Many software systems include a Web-based component that makes data available to the public via the Internet. These data stores are exposed to a variety of Web-based attacks. The fear of SQL injection attacks has become increasingly frequent and serious. This paper presents a new Technique to protect Web applications against SQL injection. SQL-Injection Attacks are a class of attacks that many of these systems are highly vulnerable to, and there is no known fool-proof defense against such attacks.