Research Article

Neutralizing SQL Injection Attack Using Server Side Code Modification in Web Applications

Table 2

Comparison of the proposed method with existing approaches.

Methods Tautology Comment line Type mismatch Stacked query Union query Stored procedure Inference Alternative methods

AMNESIAYYYYYNYY
SQLrandYPPYYNYN
SPDLPYPPPPPN
SIIMDSNPPPNPPN
SQLIPAYYYYYYYN
Proposed MethodYYYYYYYY

Y: successfully detect/prevent the attack types.
N: not able to detect/prevent the attack types.
P: partially handles the attack type.