An Optimistic Security Model for Improving Cyber Security Using Adaptive Algorithms to Prevent SQL Injection Attacks

An Optimistic Security Model for Improving Cyber Security Using Adaptive Algorithms to Prevent SQL Injection Attacks

P. Salman Raju, P. Venkateswara Rao
DOI: 10.4018/IJSPPC.2021100102
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Throughout today's economic and social life, the use of web-based services (such as e-commerce, online banking, and web-based communications, to name a few) has become a common habit. Countless applications operate worldwide on millions of servers, and their numbers are steadily increasing. It has become a focus of attackers and hackers for the attacks because of the huge growth of internet usage. It is necessary for all companies to develop and protect their applications in order to maintain their credibility and keep their products relevant for users. Web applications have brought in new classes of computer security vulnerabilities, such as SQL injection (SQLIA), and it has exceeded previously prominent vulnerability classes in recent years. SQL injection is the instance of the broader class of vulnerabilities that are based on input validation. The primary purpose of this research is to study the vulnerabilities of SQL injection and to propose an optimistic security model for secure data transmission. In this work, the authors proposed an adaptive algorithm to prevent SQL injections.
Article Preview
Top

1. Introduction

1.1 Background of the Study

1.1.1 What is Cybersecurity?

Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes. Implementing effective cybersecurity measures is particularly challenging today because there are more devices than people, and attackers are becoming more innovative.

1.1.2 Types of Cybersecurity Threats

  • Phishing: It is the practice of sending fraudulent emails that resemble emails from reputable sources. The aim is to steal sensitive data like credit card numbers and login information. It’s the most common type of cyber-attack. You can help protect yourself through education or a technology solution that filters malicious emails.

  • Ransomware: It is a type of malicious software. It is designed to extort money by blocking access to files or the computer system until the ransom is paid. Paying the ransom does not guarantee that the files will be recovered or the system restored.

  • Malware: It is a type of software designed to gain unauthorized access or to cause damage to a computer.

  • Social engineering: It is a tactic that adversaries use to trick you into revealing sensitive information. They can solicit a monetary payment or gain access to your confidential data. Social engineering can be combined with any of the threats listed above to make you more likely to click on links, download malware, or trust a malicious source (Cisco, n.d.).

1.1.3 Session Hijacking

Web-based applications often use sessions to upgrade the client amicable experience for their clients. Usage of different sorts of the session the board does this. Session the executive chips away at the accompanying idea. At some early point in the client cooperation, the server creates a session identifier ID which is sent to the client's program and guarantees that a similar ID is sent back by the program alongside each consequent solicitation. Session IDs are recognizable proof tokens for the clients, and are utilized by the servers to keep up the session information (e.g., factors) (Desmet et al., 2008).

Figure 1.

Capturing user session id

IJSPPC.2021100102.f01

1.1.4 SQL Injection

An SQL injection is a security weakness that occurs within database application layers. It is an act of passing SQL code to web-based interactive applications used in database services. SQL Injection is a web application database utilisation tool. This is achieved by inserting the SQL statements as an input string to access the database unauthorized (Ali et al., 2010).

An SQL injection is a severe weakness that results in a high level of compromise-usually the ability to execute a database query. This is a web-based code attack linking backends to the database and allowing to bypass the firewall. The downside of vulnerable code and inadequate validation of the data is that the attacker executes unauthorized SQL commands.

The interactive database-driven web page focuses on generating HTML content based on user-received feedback. For example, a web page on a news site may display articles related to a specific category, such as Sports, Politics, etc., depending on the value passed through the URL query string (Ghafarian, 2017).

Figure 2.

Attacker hacking through SQL Injections

IJSPPC.2021100102.f02
Figure 3.

Attacker password hacking through SQL Injections

IJSPPC.2021100102.f03

Similarly, the search page would display the results based on the keywords entered by the user in the input box. Generally, the web page receives these inputs through the parameters of the string query URL and/or the form fields. Cookie values and other HTTP headers included in the request are also other input forms and may be used in the logic of the program as required. For example, the news site web page may display articles related to a specific category, such as Sports, Politics, etc., depending on the value passed through the URL query string.

Using this injection technique, the attacker can gain unauthorized access to the restricted areas of the web application and can also retrieve, alter or damage the information in the backend database. In most cases, the attacker's intention is to steal sensitive information, such as credit card details, email addresses, passwords, and other private information, stored in the backend database.

Complete Article List

Search this Journal:
Reset
Volume 16: 1 Issue (2024): Forthcoming, Available for Pre-Order
Volume 15: 1 Issue (2023)
Volume 14: 4 Issues (2022): 1 Released, 3 Forthcoming
Volume 13: 4 Issues (2021)
Volume 12: 4 Issues (2020)
View Complete Journal Contents Listing