The Solutions of SQL Injection Vulnerability in Web Application Security
Syamasudha V1, Abdul Raheem Syed2, Gayatri E3
1Syamasudha V, Assistant Professor, CSE Department, Annamacharya Institute of Science and Technology Tirupati, (A.P), India.
2Abdul Raheem Syed, Research Scholar, School of Computing and IT Rev, University Bangalore, Karnataka, India.
3Gayatri E, Assistant Professor, CSE Department, SV Engineering College, Tirupati, (A.P), India.

Manuscript received on July 15, 2019. | Revised Manuscript received on August 06, 2019. | Manuscript published on August 30, 2019. | PP: 3803-3808 | Volume-8 Issue-6, August 2019. | Retrieval Number: F9395088619/19©BEIESP | DOI: 10.35940/ijeat.F9395.088619
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (

Abstract: Web Applications are commonly using all the services made available online. The rapid development of the Internet of Things (IOT), all the organizations provides their services and controlled through an online, like online transaction of money, business transaction of buying and selling the products, healthcare services, military and GPS Systems. Web application development and maintenance is very difficult based on the security. Attacks are many forms to stealing the secure, personal information and privacy data. There is one major open source community Open Web Application Security Project (OWASP) providing information, development and validation of web application projects to make application to be secure. This research work, discussing few of the solutions, detection and prevention methods of Injection risk out of the top 10 OWASP risks. Due to the injection risk, impact on business that may lead to loss of information, unauthorized access of personal and secure information.
Keywords: Web application Security, Information Flow, Injection flaw, Secure Compositions coding.