TY - GEN
T1 - Diverse Approaches Have Been Presented To Mitigate SQL Injection Attack, But It Is Still Alive
T2 - 4th International Conference on Computer and Applications, ICCA 2022
AU - Qbea'h, Mohammad
AU - Alrabaee, Saed
AU - Alshraideh, Mohammad
AU - Sabri, Khair Eddin
N1 - Funding Information:
ACKNOWLEDGMENT We are grateful to the anonymous reviewers for their comments and suggestions. The second author is partially supported by the United Arab Emirates University Grant 12R143.
Publisher Copyright:
© 2022 IEEE.
PY - 2022
Y1 - 2022
N2 - A huge amount of stored and transferred data is expanding rapidly. Therefore, managing and securing the big volume of diverse applications should have a high priority. However, Structured Query Language Injection Attack (SQLIA) is one of the most common dangerous threats in the world. Therefore, a large number of approaches and models have been presented to mitigate, detect or prevent SQL injection attack but it is still alive. Most of old and current models are created based on static, dynamic, hybrid or machine learning techniques. However, SQL injection attack still represents the highest risk in the trend of web application security risks based on several recent studies in 2021. In this paper, we present a review of the latest research dealing with SQL injection attack and its types, and demonstrating several types of most recent and current techniques, models and approaches which are used in mitigating, detecting or preventing this type of dangerous attack. Then, we explain the weaknesses and highlight the critical points missing in these techniques. As a result, we still need more efforts to make a real, novel and comprehensive solution to be able to cover all kinds of malicious SQL commands. At the end, we provide significant guidelines to follow in order to mitigate such kind of attack, and we strongly believe that these tips will help developers, decision makers, researchers and even governments to innovate solutions in the future research to stop SQLIA.
AB - A huge amount of stored and transferred data is expanding rapidly. Therefore, managing and securing the big volume of diverse applications should have a high priority. However, Structured Query Language Injection Attack (SQLIA) is one of the most common dangerous threats in the world. Therefore, a large number of approaches and models have been presented to mitigate, detect or prevent SQL injection attack but it is still alive. Most of old and current models are created based on static, dynamic, hybrid or machine learning techniques. However, SQL injection attack still represents the highest risk in the trend of web application security risks based on several recent studies in 2021. In this paper, we present a review of the latest research dealing with SQL injection attack and its types, and demonstrating several types of most recent and current techniques, models and approaches which are used in mitigating, detecting or preventing this type of dangerous attack. Then, we explain the weaknesses and highlight the critical points missing in these techniques. As a result, we still need more efforts to make a real, novel and comprehensive solution to be able to cover all kinds of malicious SQL commands. At the end, we provide significant guidelines to follow in order to mitigate such kind of attack, and we strongly believe that these tips will help developers, decision makers, researchers and even governments to innovate solutions in the future research to stop SQLIA.
KW - application security
KW - cybersecurity
KW - data security
KW - malicious code
KW - mobile security
KW - review
KW - sql injection attack
KW - sqlia
KW - vulnerability
KW - web security
UR - http://www.scopus.com/inward/record.url?scp=85149335488&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85149335488&partnerID=8YFLogxK
U2 - 10.1109/ICCA56443.2022.10039611
DO - 10.1109/ICCA56443.2022.10039611
M3 - Conference contribution
AN - SCOPUS:85149335488
T3 - Proceedings of the International Conference on Computer and Applications, ICCA 2022 - Proceedings
BT - Proceedings of the International Conference on Computer and Applications, ICCA 2022 - Proceedings
A2 - Alja'Am, Jihad M.
A2 - AlMaadeed, Soumaya
A2 - Elseoud, Samir Abou
A2 - Karam, Omar
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 20 December 2022 through 22 December 2022
ER -