Dr.Manju Kaushik,Gazal Ojha
We have several news regarding data alteration in the communication background. The SQL Injection attack is a popular way of attack in terms of document structure and common threats now a day. There are several ways of attack detection as per our study and also prevention methods had been discussed in several research papers. In this paper our main motivation to discuss and find the better methodology so that in future we can design better attack detection and prevention methods. For better security we also discuss encryption and decryption techniques.