SQL Code Poisoning: The Most Prevalent Technique for Attacking Web Powered Databases

SQL Code Poisoning: The Most Prevalent Technique for Attacking Web Powered Databases

Theodoros Tzouramanis (University of the Aegean, Greece)
DOI: 10.4018/978-1-60566-058-5.ch128
OnDemand PDF Download:
$37.50

Abstract

This chapter focuses on the SQL code poisoning attack. It presents various ways in which a Web database can be poisoned by malicious SQL code, which can result in the compromise of the system. Subsequently, techniques are described for the detection of SQL code poisoning and a number of lockdown issues that are related to this type of attack are discussed. This chapter also reviews security mechanisms and software tools that protect Web applications against unexpected data input by users; against alterations of the database structure; and against the corruption of data and the disclosure of private and confidential information, all of which are owed to the susceptibility of these applications to this form of attack.

Complete Chapter List

Search this Book:
Reset