Protecting Websites from Dissociative Identity SQL Injection Attack- a Patch for Human Folly
Keywords:
SQL Injection, SQL Injection Attack, Aho-Corasick Algorithm, Anomaly ScoringAbstract
Injection attack is a method that can inject any kind of malicious string or anomaly string on the original string. Most of the pattern based techniques are used static analysis and patterns are generated from the attacked statements. In this project, we proposed a detection and prevention technique for preventing SQL Injection Attack (SQLIA) using Aho-Corasick pattern matching algorithm. The basic goal of our project is to minimize the web-based attacks like SQL Injection Attack (SQLIA) and reduce the load of server.
References
Aho, Alfred V.; Margaret J. Corasick (June 1975). "Efficient string matching: An aid to bibliographic search". Communications of the ACM 18 (6): 333–340
Commentz-Walter B. A string matching algorithm fast on the average, Proc. 6th International Colloquium on Automata, Languages, and Programming (1979), pp. 118-132.
Alsmadi I., Nuser M., String Matching Evaluation Methods for DNA Comparisons, International Journal of Advanced Science and Technology, Vol.47, 2012.
Amir A., Lewenstein M., and Porat E., Faster Algorithms for String Matching with K-Mismatches, Journal of Algorithms 50(2004) 257-275.
Gomaa N.H., Fahmy A.A., Short Answer Grading using String Similarity and Corpus-Based Similarity, International Journal of Advanced Computer Science and Applications, Vol 3,No.11, 2012.
C.J. Ezeife, J. Dong, A.K. Aggarwal, “Sensor Web-IDS: A Web Mining Intrusion Detection System”, International Journal of Web Information Systems, volume 4, pp. 97-120, 2007
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
