Impact Factor (2025): 6.9
DOI Prefix: 10.47001/IRJIET
Vol 7 No 2 (2023): Volume 7, Issue 2, February 2023 | Pages: 101-106
International Research Journal of Innovations in Engineering and Technology
OPEN ACCESS | Research Article | Published Date: 04-03-2023
Protection of data is essential in this rapidly evolving technological world. As many of the users rely on the database management system for protection and storage of the sensitive/personal data. Hackers use various methods to invade the user’s privacy such as SQL Injection Attack, Denial of Service, Weak Authentication, etc. There are several measures to counter these attacks such as Vulnerability Scanners, Input Validation, Firewall and Intrusion Detection Systems, Two Factor Authentication and Password Complexity, etc. This paper studies the types of Database Attacks, their counter measures and proposes an approach to defend against these attacks.
SQL Injection Attack, Denial of Service, Weak Authentication, Vulnerability Scanners, Input Validation, Firewall and Intrusion Detection Systems, Two Factor Authentication and Password Complexity
Omkar Kamleshwar Kambre, Kabir Kiran Shah, Pankaj Dulabhai Rathod, “SQL Injection Attacks and Defense Mechanisms” Published in International Research Journal of Innovations in Engineering and Technology - IRJIET, Volume 7, Issue 2, pp 101-106, February 2023. Article DOI https://doi.org/10.47001/IRJIET/2023.702016
This work is licensed under Creative common Attribution Non Commercial 4.0 Internation Licence