Meru University of Science and Technology: Addressing SQL Injections Threats in Web Security
Meru University of Science and Technology: Addressing SQL Injections Threats in Web Security
Meru University of Science and Technology: Addressing SQL Injections Threats in Web Security
Technology
School of Computing and Informatics
ADDRESSING SQL INJECTIONS THREATS IN WEB SECURITY
A multitude of research endeavors have focused on detecting, preventing, and mitigating SQL injection vulnerabilities in web applications,
exploring aspects such as vulnerability analysis, attack modeling, and detection algorithms. Additionally, studies have examined the
economic ramifications of SQL injection attacks, underlining the financial losses organizations may incur due to data breaches and service
disruptions. Insights gleaned from these studies have informed best practices and guidelines, emphasizing the importance of proactive
defense mechanisms and comprehensive security approaches to mitigate SQL injection threats effectively.
A multi-layered defense strategy will be implemented to fortify our system against SQL injection attacks.
Rigorous input validation mechanisms will be deployed, tailored to detect and reject any malicious entries
effectively. Additionally, parameterized queries will be adopted to separate SQL code from user input, thereby
preventing injection attacks at the code level. This separation ensures that user input is treated purely as data
and not executable code. Furthermore, runtime monitoring tools will be integrated to conduct real-time
analysis of query behaviors. This proactive approach enables the timely detection of anomalies indicative of
SQL injection attempts, allowing for swift response and mitigation measures to be implemented. By
combining these measures, our system will be significantly bolstered against SQL injection threats, ensuring
the integrity and security of our data and applications.
Main Objective
Develop and implement a comprehensive defense strategy for database-driven web applications to mitigate SQL injection attacks
effectively.
Specific Objectives
• Implement rigorous input validation tailored to each input field's requirements to detect and reject malicious entries.
• Adopt parameterized queries to separate SQL code from user input, preventing injection attacks at the code level.
• Integrate runtime monitoring tools into the application environment for real-time analysis of query behaviors to detect
anomalies indicative of SQL injection.
Kals et al. 2017 Machine learning-based Advocates for the use of machine learning to enhance
approaches for enhancing intrusion detection systems against evolving SQL injection
intrusion detection tactics.
Jovanovic et 2006 Positive Tainting as a Positive tainting marks data as safe, complementing
al. Preventive Measure for SQL traditional detection methods
Injection
Athanasopoul 2018 Challenges in Adapting to Attackers continuously adapt, posing challenges for
os et al. Evolving Attack Vectors traditional detection methods
TOPIC APPROVAL
PROPOSAL WRITING
SYSTEM DESIGN
SYSTEM DEVELOPMENT
SYSTEM SUBMISION
6 Hardware 60,000
components
TOTAL
81,500
End of Presentation