Prevention of DDoS and SQL Injection Attack By Prepared Statement and IP Blocking

B.Yamini*, David**, S. Deepananda arthi***
* Assistant Professor, Department of Computer Science and Engineering, Jeppiaar SRR Engineering College, Tamil Nadu, India.
**,*** BE Graduate, Department of Computer Science and Engineering, Jeppiaar SRR Engineering College, Tamil Nadu, India.
Periodicity:January - March'2018
DOI : https://doi.org/10.26634/jse.12.3.14556

Abstract

Hackers exploit web applications using malicious scripts to access the server. In this paper, the authors detect various attacks using vulnerability scanner tools. The major attacks, such as Distributed Denial of Service (DDoS) attack and Structured Query Language (SQL) injection attack are scanned and prevented using prepared statement and IP Blocking methods. Application security is achieved using web vulnerability scanner, which scans all the scripts used inside the application for vulnerability injection scripts (Cross-site Request Forgery (CSRF) and SQL injection).

Keywords

Vulnerability Scanner, IP Blocking.

How to Cite this Article?

Yamini, B., Brindha, L., and Arthi, D, S. (2018). Prevention of DDoS and SQL Injection Attack By Prepared Statement and IP Blocking. i-manager's Journal on Software Engineering, 12(3), 16-20. https://doi.org/10.26634/jse.12.3.14556

References

[1]. Balasundaram, E. R. I. (2011). An approach to detect and prevent SQL injection attacks in database using web service. IJCSNS International Journal of Computer Science and Network Security, 11(1), 95-100.
[2]. Elshazly, K., Fouad, Y., Saleh, M., & Sewisy, A. (2014). Asurvey of SQL injection attack detection and prevention. Journal of Computer and Communications, 2(08), 1-9.
[3]. Fyodor. (2000). Nmap: Free Network Security Scanner, Retrieved from https://nmap.org/presentations/
[4]. HelpNetSecurity. (2011). Cisco Firewall Services Module DoS Vulnerability. Retrieved from https://www. helpnetsecurity.com/2011/02/28/cisco-firewall-servicesmodule- dos-vulnerability/
[5]. Khakpour, A. R., Hulst, J. W., Ge, Z., Liu, A. X., Pei, D., & Wang, J. (2012, March). Firewall fingerprinting. In INFOCOM, 2012 Proceedings IEEE (pp. 1728-1736). IEEE.
[6]. Sajjadi, S. M. S., & Pour, B. T. (2013). Study of SQL Injection attacks and countermeasures. International Journal of Computer and Communication Engineering, 2(5), 539-542.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.