J. Okesola, A. Ogunbanwo, Ayoade A. Owoade, Emmanuel O. Olorunnisola, Kennedy Okokpuji
{"title":"Securing web applications against SQL injection attacks - A Parameterised Query perspective)","authors":"J. Okesola, A. Ogunbanwo, Ayoade A. Owoade, Emmanuel O. Olorunnisola, Kennedy Okokpuji","doi":"10.1109/SEB-SDG57117.2023.10124613","DOIUrl":null,"url":null,"abstract":"SQL Injection attack is a major threat to web applications and source of concerns to e-commerce in particular. The attack bypasses major security measures to execute malicious SQL codes and have absolute control of the database server behind the web application. Going by millions of dollars being spent yearly by various organizations to guide against the attack, it is imperative to have a better understanding of how SQL Injection works and how best it could be prevented. Using an e-commerce application as a case study, this paper demonstrates how Parameterized Queries could be used to defend SQL Injection attacks. With prepared statements in Java where LoginController was employed as the Servlet to control the application login procedure, Parameterized Queries were successfully incorporated into an e-commerce application. The implementation results shows that SQL injection is no longer possible as every code from attackers could not be executed because input was set to be data and data would be treated differently from codes.","PeriodicalId":185729,"journal":{"name":"2023 International Conference on Science, Engineering and Business for Sustainable Development Goals (SEB-SDG)","volume":"272 3","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Science, Engineering and Business for Sustainable Development Goals (SEB-SDG)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SEB-SDG57117.2023.10124613","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
SQL Injection attack is a major threat to web applications and source of concerns to e-commerce in particular. The attack bypasses major security measures to execute malicious SQL codes and have absolute control of the database server behind the web application. Going by millions of dollars being spent yearly by various organizations to guide against the attack, it is imperative to have a better understanding of how SQL Injection works and how best it could be prevented. Using an e-commerce application as a case study, this paper demonstrates how Parameterized Queries could be used to defend SQL Injection attacks. With prepared statements in Java where LoginController was employed as the Servlet to control the application login procedure, Parameterized Queries were successfully incorporated into an e-commerce application. The implementation results shows that SQL injection is no longer possible as every code from attackers could not be executed because input was set to be data and data would be treated differently from codes.