Evaluating Input Validation Techniques For SQL Injection Defense

Authors

  • Jiho Choi Author
  • Taek Lee Author
  • Hoon Ko Author

DOI:

https://doi.org/10.64252/7m1g0t74

Keywords:

SQL Injection, Input Normalization, Blacklist/Whitelist Filtering, FSM-based Validation, Multi-layered Defense

Abstract

This study compares four SQL Injection defense techniques: input normalization, blacklist and whitelist filtering, and FSM-based context validation. Experiments using identical attack payloads show that normalization improves overall filtering accuracy, while blacklist filtering is simple to implement but vulnerable to evasion. In contrast, whitelist and FSM-based methods provide strong defensive performance but require greater implementation effort and maintenance. Overall, no single technique is sufficient on its own; instead, a multi-layered defense strategy that integrates normalization, filtering, and context validation is shown to be the most effective approach.

Downloads

Download data is not yet available.

Downloads

Published

2025-12-19

Issue

Section

Articles

How to Cite

Evaluating Input Validation Techniques For SQL Injection Defense. (2025). International Journal of Environmental Sciences, 3656-3663. https://doi.org/10.64252/7m1g0t74