Vol. 2, Issue 5 (2015)
SQL Injection and Proposed Methods: Comparison of tools and efficiency for preventing SQL attacks
Author(s): Naveesha Saharan, Aditi Kajala
Abstract: SQL Injection continues to be the topmost security risk in the world according to Open Web Application Security Project (OWASP)  top 10 vulnerability list of 2013. The ease of exploitability and severe impact are what that lands this attack at top spot. As the countermeasures are made more sophisticated, injection also continues to evolve itself, thus thwarting the attempt to completely tackle this attack. The vulnerable data is a source of worry for government as well as financial institution. In this digital age, the consequence of an unauthorized access to a database could vary from lack of confidentiality of clients to a destabilized nation embroiled in war. In this paper, a detailed survey of types of SQL Injection and proposed methods and theories is been presented along with tools and their efficiency in intercepting and thus preventing SQL attacks.