http://www.iaeme.com/IJCIET/index.asp 42 editor@iaeme.com International Journal of Computer Engineering & Technology (IJCET) Volume 6, Issue 10, Oct 2015, pp. 42-50, Article ID: IJCET_06_10_005 Available online at http://www.iaeme.com/IJCET/issues.asp?JType=IJCET&VType=6&IType=10 ISSN Print: 0976-6367 and ISSN Online: 09766375 © IAEME Publication ___________________________________________________________________________ DEFEATING SQL INJECTION USING QUERY STRING ATTACK PREVENTION TECHNIQUE U. V. Anbazhagu Assistant Professor, Department of Computer Science and Engineering, VELS UNIVERSITY, Pallavaram, Chennai, India. P. Deepalakshmi and J.S.Praveen Research Scholar , AMET University, Chennai, India. ABSTRACT The ever-increasing dependence on web applications have made a natural target for attackers. Among these attacks SQL Injection Attacks (SQLIA) are the most common. SQL injection attack is a technique to exploit security vulnerability in the database layer of a Web application. In SQLIA, the attacker injects some malicious query to the database in order to change the structure of the query intended by the programmer and thereafter, gain access of database. After accessing the user’s data the actual database can be changed or modified or destroyed. The main cause of such type of attack is the lack of input validation and web administration. Now a day the all important records and details are processed over internet such as the online banking, studies, research works, online examinations. So the main challenge for the developer to keep these records and details out of reach from the hacker or attacker.In this paper Query String Attack Prevention Technique is proposed for detection and prevention technique of SQL injection attack. Key words: WEB application, SQLIA, detection, prevention, vulnerabilities, Web architecture. Cite this Article: Anbazhagu, U. V., Deepalakshmi, P. and Praveen, J. S. Defeating SQL Injection Using Query String Attack Prevention Technique. International Journal of Computer Engineering and Technology, 6(10), 2015, pp. 42-41. http://www.iaeme.com/IJCET/issues.asp?JType=IJCET&VType=6&IType=10 1. INTRODUCTION Web Application hacking such as Injection attacks take advantage of improperly coded applications to insert and execute attacker-specified commands, enabling access to critical data and resources. Web applications need a defense-in-depth