{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:33:57Z","timestamp":1767339237694,"version":"3.40.5"},"reference-count":33,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,4,1]]},"abstract":"<p>Databases are widely used by organizations to store business-critical information, which makes them one of the most attractive targets for security attacks. SQL Injection is the most common attack to webpages with dynamic content. To mitigate it, organizations use Intrusion Detection Systems (IDS) as part of the security infrastructure, to detect this type of attack. However, the authors observe a gap between the comprehensive state-of-the-art in detecting SQL Injection attacks and the state-of-practice regarding existing tools capable of detecting such attacks. The majority of IDS implementations provide little or no protection against SQL Injection attacks, with exceptions like the tools Bro and ModSecurity. In this article, the authors compare these tools using the CSIC dataset in order to examine the state-of-practice in database protection from SQL Injection attacks, identifying the main characteristics and implementation details needed for IDSs to successfully detect such attacks. The experiments indicate that signature-based IDS provide the greatest coverage against SQL Injection.<\/p>","DOI":"10.4018\/ijisp.2020040102","type":"journal-article","created":{"date-parts":[[2020,1,24]],"date-time":"2020-01-24T15:57:54Z","timestamp":1579881474000},"page":"20-40","source":"Crossref","is-referenced-by-count":4,"title":["Intrusion Detection Systems for Mitigating SQL Injection Attacks"],"prefix":"10.4018","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0851-2647","authenticated-orcid":true,"given":"Rui Filipe","family":"Silva","sequence":"first","affiliation":[{"name":"Polytechnic of Coimbra - ISEC, Coimbra, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2916-7571","authenticated-orcid":true,"given":"Raul","family":"Barbosa","sequence":"additional","affiliation":[{"name":"University of Coimbra - UC Center for Informatics and Systems of University of Coimbra, Coimbra, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9660-2011","authenticated-orcid":true,"given":"Jorge","family":"Bernardino","sequence":"additional","affiliation":[{"name":"Polytechnic of Coimbra - ISEC, Coimbra, Portugal"}]}],"member":"2432","reference":[{"key":"IJISP.2020040102-0","doi-asserted-by":"publisher","DOI":"10.1109\/ICoAC.2015.7562806"},{"key":"IJISP.2020040102-1","doi-asserted-by":"publisher","DOI":"10.30630\/joiv.2.4.107"},{"key":"IJISP.2020040102-2","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSec.2015.23"},{"key":"IJISP.2020040102-3","unstructured":"Alsahafi, R. (2019). SQL injection attacks: detection and prevention techniques. International Journal of Scientific & Technology Research, (8), 182-185."},{"key":"IJISP.2020040102-4","unstructured":"Arabo, A. (2019). Distributed ids using agents: An agent-based detection system to detect passive and active threats to a network. Proceedings of the 14th international conference on cyber warfare and security. IEEE."},{"key":"IJISP.2020040102-5","doi-asserted-by":"publisher","DOI":"10.33166\/AETiC.2018.01.005"},{"key":"IJISP.2020040102-6","doi-asserted-by":"publisher","DOI":"10.1145\/3287324.3287490"},{"key":"IJISP.2020040102-7","doi-asserted-by":"publisher","DOI":"10.5769\/J201801001"},{"key":"IJISP.2020040102-8"},{"key":"IJISP.2020040102-9","unstructured":"Control Objectives for Information and Related Technologies. (2012). COBIT 5 for Information Security. Retrieved from http:\/\/www.isaca.org\/cobit\/pages\/info-sec.aspx"},{"key":"IJISP.2020040102-10","doi-asserted-by":"publisher","DOI":"10.3923\/jai.2019.11.17"},{"key":"IJISP.2020040102-11","doi-asserted-by":"publisher","DOI":"10.3390\/fi11020044"},{"key":"IJISP.2020040102-12","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2012.4208"},{"key":"IJISP.2020040102-13","unstructured":"International Organization for Standardization. (2013). Information technology -- Security techniques -- Code of practice for information security controls. Retrieved from https:\/\/www.iso.org\/standard\/54533.html"},{"key":"IJISP.2020040102-14","doi-asserted-by":"publisher","DOI":"10.5120\/3399-4730"},{"key":"IJISP.2020040102-15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.04.005"},{"issue":"1","key":"IJISP.2020040102-16","first-page":"26","article-title":"Systematic Literature Review on SQL Injection Attack.","volume":"11","author":"M.Lawal","year":"2016","journal-title":"Internation Journal of Soft Computing"},{"key":"IJISP.2020040102-17","doi-asserted-by":"publisher","DOI":"10.1145\/2808691"},{"key":"IJISP.2020040102-18","first-page":"26","article-title":"Systematic literature review on sql injection attack.","volume":"11","author":"L.Muhammad Aminu","year":"2016","journal-title":"International Journal of Soft Computing"},{"key":"IJISP.2020040102-19","unstructured":"National Institute of Standards and Technology. (2007). Guidelines on Securing Public Web Servers. Retrieved from https:\/\/nvlpubs.nist.gov\/nistpubs\/Legacy\/SP\/nistspecialpublication800-44ver2.pdf"},{"key":"IJISP.2020040102-20","unstructured":"OWASP. (2016, April 4). SQL Injection. Retrieved from https:\/\/www.owasp.org\/index.php\/SQL_Injection"},{"key":"IJISP.2020040102-21","doi-asserted-by":"crossref","unstructured":"Pandurang, R. M., & Karia, D. C. (2015). A mapping-based model for preventing cross site scripting and sql injection attacks on web application and its impact analysis. In Proceedings of the 2015 1st International Conference on Next Generation Computing Technologies (NGCT) (pp. 414-418). Academic Press.","DOI":"10.1109\/NGCT.2015.7375152"},{"issue":"2","key":"IJISP.2020040102-22","first-page":"62","article-title":"Web Security Attacks and Injection- A Survey.","volume":"5","author":"S.Patil","year":"2015","journal-title":"International Journal of Advancements in Research & Technology"},{"key":"IJISP.2020040102-23","unstructured":"Putri, T., Warra, H., Sitepu, I., Sihombing, M. & Silvi. Analysis and Detection of HOAX Contents in Indonesian News Based on Machine Learning. (2019). JIPN (Journal of Informatics Pelita Nusantara), (4), 19-26."},{"key":"IJISP.2020040102-24","first-page":"56","article-title":"Security assessment of php web applications from sql injection attacks.","volume":"6","author":"A.Rahman","year":"2015","journal-title":"Journal of Next Generation Information Technology"},{"issue":"118","key":"IJISP.2020040102-25","first-page":"599","article-title":"SQL Injection Attack Prevention by Direct Reverse Resemblance Technique.","author":"S.Raj","year":"2018","journal-title":"International Journal of Pure and Applied Mathematics"},{"journal-title":"Modsecurity handbook","year":"2010","author":"I.Ristic","key":"IJISP.2020040102-26"},{"key":"IJISP.2020040102-27","doi-asserted-by":"crossref","unstructured":"Santos, R. J., Bernardino, J., & Vieira, M. (2011). A survey on data security in data warehousing: Issues, challenges and opportunities. Proceedings of the 2011 IEEE EUROCON - International Conference on Computer as a Tool. IEEE.","DOI":"10.1109\/EUROCON.2011.5929314"},{"key":"IJISP.2020040102-28","first-page":"258","article-title":"SQL-IDS: evaluation of SQLi attack detection and classification based on machine learning techniques.","author":"N. M.Sheykhkanloo","year":"2015","journal-title":"Proceedings of the 8th International Conference on Security of Information and Networks"},{"issue":"8","key":"IJISP.2020040102-29","first-page":"23","article-title":"Study on sql injection attacks: Mode detection and prevention.","volume":"1","author":"S.Som","year":"2016","journal-title":"International Journal of Engineering Applied Sciences and Technology"},{"key":"IJISP.2020040102-30","doi-asserted-by":"publisher","DOI":"10.1109\/PERVASIVE.2015.7087131"},{"key":"IJISP.2020040102-31","doi-asserted-by":"publisher","DOI":"10.4156\/ijact.vol3.issue7.11"},{"key":"IJISP.2020040102-32","unstructured":"Thimmappa, A. (2016). SQL Injection Detection and Prevention. International Journal Series in Multidisciplinary Research (IJSMR), (2), 25-36."}],"container-title":["International Journal of Information Security and Privacy"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=247425","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T23:52:04Z","timestamp":1651881124000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJISP.2020040102"}},"subtitle":["Review and State-of-Practice"],"short-title":[],"issued":{"date-parts":[[2020,4,1]]},"references-count":33,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,4]]}},"URL":"https:\/\/doi.org\/10.4018\/ijisp.2020040102","relation":{},"ISSN":["1930-1650","1930-1669"],"issn-type":[{"type":"print","value":"1930-1650"},{"type":"electronic","value":"1930-1669"}],"subject":[],"published":{"date-parts":[[2020,4,1]]}}}