With the rise of the Internet, web applications, such as online banking and web-based email, have become integral to
many people‟s daily lives. Web applications have brought with them new classes of computer security vulnerabilities,
such as SQL injection. It is a class of input validation based vulnerabilities. Typical uses of SQL injection leak
confidential information from a database, by-pass authentication logic, or add unauthorized accounts to a database.
This security prevents the unauthorized access to your database and also it prevents your data from being altered or
deleted by users without the appropriate permissions. Malicious Text Detector, Constraint Validation, Query length
validation and Text based Key Generator are the four types of filtration technique used to detect and prevent the SQL
Injection Attacks from accessing the database