2564-7814

SEPTIC: Vulnerabilities in the DBMS and injection attacks are noted

Main Article Content

S. Anitha,Paramhans Yadav,Kakunuri Sandhya,Pooduri Abhilash,Penumatasa Sai pramodvarma

Abstract

Although databases are still the most widely used backend storage in businesses, injection attacks can be carried out against them since they are frequently connected with weak applications frontends.Because of like a web semantic discrepancy between how SQL queries are actually processed by databases and how they are commonly understood to be performed, these attacks are particularly powerful.This results in minute vulnerabilities in the way apps validate input. The method for preventing DBMS attacks that we present in this paper, called SEPTIC, can also help identify application vulnerabilities. The method was put into practice in MySQL and tested in experimental settings with different protection strategies.In contrast to other solutions, our data demonstrate that SEPTIC produces neither false positives nor false negatives.Additionally,

Article Details