Main Article Content

Falguni Jindal
Serena Lekhrajani
Sanyuktha Kumbla
Rashi Baid
Sanjay Deshmukh


While making the world smaller, internet is
experiencing an increase in cyber crimes like hacking, identity
and data theft and people fall prey to malicious attacks because
of lack of knowledge. SQLIA enables unauthorized users to make
use of loopholes within any system to gain access to its databases
and phish data, using tautologies, piggybacking, and union.
These intrusions can be handled by an IDS which involves
monitoring and analyzing: user activities, system activities,
configurations and vulnerabilities, abnormal activity patterns,
user policy violations, etc. IDS transforms the captured packets
to a predefined data structure. Our proposed system's slow
detection link combats the drawback of using a Snort plug-in
which obtains only the port information of the source IP-address.
An IDS can be integrated with a honeypot which allows the user
to attack to learn the pattern of various attacks and prevent such
attacks on the main system.


Download data is not yet available.

Article Details



Rahul Johari and Pankaj Sharma, “A Survey On Web Application

Vulnerabilities (SQLIA, XSS) Exploitation and Security Engine for SQL

Injection†in International Conference on Communication Systems and

Network Technologies, 2012.

Michelle Ruse, Tanmoy Sarkar and Samik Basu, “Analysis & Detection of

SQL Injection Vulnerabilities via Automatic Test Case Generation of

Programs†in 10th Annual International Symposium on Applications and the

Internet, 2010.

Yohanes Wahyu Trio Pramono and Suhardi, “Design of Anomaly-based

Intrusion Detection and Prevention System for Smart City Web Application

using Rule-Growth Sequential Pattern Mining†in IEEE, 2014.

Mohammad Qbea’h, Mohammad Alshraideh and Khair Eddin Sabri, “

Detecting and Preventing SQL Injection Attacks: A formal Approach†in

Cybersecurity and Cyberforensics Conference, 2016.

Abdelhamid MAKIOU, Youcef BEGRICHE and Ahmed

SERHROUCHNI, “Improving Web Application Firewalls to Detect

Advanced SQL Injection Attacksâ€, in IEEE, 2014.

Anitha.V, Supha Lakshmi.A, Revathi.M and Selvi.K, “Detecting Various

SQL Injection Vulnerabilities using String Matching and LCS Methodâ€, in

Sixth International Conference on Advanced Computing, 2014.

Hussein Alnabulsi, Md Rafiqul Islam and Quazi Mamun, “Detecting SQL

Injection Attacks Using SNORT IDSâ€, in IEEE, 2013.

Chunmei YIN, Mingchu LI, Jianh MA and Jizhou SUN, “Honeypot and

Scan Detection in Intrusion Detection Systemâ€, in IEEE, 2004

Umesh Hodeghatta Rao and Bishwa Prakash Pati, “Study of Internet

Security Threats Among Home Usersâ€, in IEEE, 2012.

Loras R. Even , ‘Honey Pot Systems Explained’ , July 12, 2000, URL :


Most read articles by the same author(s)