Structured Query Language Injection Attack (SQLIA) is the most exposed to attack on the Internet. From this attack, the attacker can take control of the database therefore be able to interpolate the data from the database server for the website. Hence, the big challenge became to secure such website against attack via the Internet. We have presented different types of attack methods and prevention techniques of SQLIA which were used to aid the design and implementation of our model. In the paper, work is separated into two parts. The first aims to put SQLIA into perspective by outlining some of the materials and researches that have already been completed. The section suggesting methods of mitigating SQLIA aims to clarify some misconceptions about SQLIA prevention and provides some useful tips to software developers and database administrators. The second details the creation of a filtering proxy server used to prevent a SQL injection attack and analyses the performance impact of the filtering process on web application.
 Overstreet, R. (2004) Protecting Yourself from SQL Injection Attacks.
 Imperva Inc. (2004) SQL Injection-Glossary.
 Finnigan, P. (2002) SQL Injection and Oracle. Part One. http://www.securityfocus.com/infocus/1644
 Huang, Y., Huang, S., Lin, T. and Tsai, C. (2003) Web Application Security Assessment by Fault Injection and Behavior Monitoring. http://doi.acm.org/10.1145/775152.775174
 Microsoft (2003) Secure Multi-Tier Deployment.
 Hotchkies, C. (2004) Blind SQL Injection Automation Techniques. http://www.blackhat.com/html/bh-media-archives/bh-archives-2004.html#USA-2004
 Microsoft (2003) Checklist: Security Best Practices.
 Beyond Security Ltd. (2002) SQL Injection Walkthrough.
 Finnigan, P. (2003) Detecting SQL Injection in Oracle. http://securityfocus.com/infocus/1714
 Spett, K. (2002) SPI Dynamics 2005, Inc. SQL Injection: Are Your Web Applications Vulnerable? http://www.spidynamics.com/whitepapers/WhitepaperSQLInject ion.pdf
 Grossman, J. (2004) The Challenges of Automated Web Application Scanning.
 Imperva Inc. (2005) SecureSphereTM: Dynamic Profiling FirewallTM”.
 Ristic I (2005) “ModSecurity for Java”. http://www.modsecurity.org/projects/modsecurity/java/
 Seclutions, A.G. (2003) Airlock—Application Security Gateway.
 Boyd, S.W. and Keromytis, A.D. (2004) SQLrand: Preventing SQL Injection Attacks. Proceedings of the 2nd Applied Cryptography and Network Security Conference, Yellow Mountain, 8-11 June 2004, 292-302. http://dx.doi.org/10.1007/978-3-540-24852-1_21
 Homepage for GreenSQL. http://www.greensql.net/
 About Page for Dot Defender from Applicure. http://www.applicure.com/About_dotDefender
 About Page for CodeScan from CodeScan Limited. http://codescan-labs.software.informer.com/
 Kosuga, Y., Kernel, K., Hanaoka, M., Hishiyama, M. and Takahama, Y. (2007) Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Injection. Computer Security Applications Conference, 107-117.
 Parosproxy.org. http://sourceforge.net/projects/dynamicproxy/?source=directory
 Maor, O. and Shulman, A. (2004) Blind SQL Injection.