Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2020, International Journal of Scientific Research in Computer Science, Engineering and Information Technology
https://doi.org/10.32628/CSEIT206543…
6 pages
1 file
Web application security has become real concern due to increase in attacks and data breaches. As Application becomes critical, complex and connected, the difficulty of achieving application security increases exponentially. Also there are tools and techniques to detect such attacks, threat and vulnerabilities that exist in application which developer prevent and mitigate the risk associated to it. This paper evaluates various web application attack detection mechanisms and how resistant they are against various attacking techniques. Such an evaluation is important for not only measuring the available attack defense against web application attacks but also identifying gaps to build effective solutions for different defense techniques on web application and use it for study. Based on the research, the limitations of these application attack detection techniques are identified and remedies proposed for improving the current state attack detection on web applications.
Securing web is like securing our nation. Our whole world is Internet dependent In each sector internet is very much essential. So, internet security is very much promising task for us. More than 80% attacks are at application layer and almost 90% applications are vulnerable to these attacks. The essential services like banking, education, medicine and defense are internet based application needed high level security services which are essential for the socio-eco growth of the society. In this paper we are discussed the different types of web application attacks like DOS attack, Cross Site Scripting attack(
2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)
The world is exceedingly reliant on the Internet. Nowadays, web security is biggest challenge in the corporate world. It is considered as the principle framework for the worldwide data society. Web applications are prone to security attacks. Web security is securing a web application layer from attacks by unauthorized users. A lot of the issues that occur over a web application is mainly due to the improper input provided by the client. This paper discusses the different aspects of web security and it's weakness. The main elements of web security techniques such as the passwords, encryption, authentication and integrity are also discussed in this paper. The anatomy of a web application attack and the attack techniques are also covered in details. This paper explores a number of methods for combatting this class of threats and assesses why they have not proven more successful. This paper proposes a better way for minimizing these type of web vulnerabilities. It also provides the best security mechanisms for the said attacks.
International Journal of Advances in Computer Networks and Its Security, 2015
Apparently most of the web application exists up to today has some vulnerability that can be exploited by unauthorized person. Some of well-known web application vulnerabilities are Structured Query Language (SQL) Injection, Cross-Site Scripting (XSS) and Buffer Overflow. By compromising with these web application vulnerabilities, the system cracker can gain information about the user and lead to the reputation of the respective organization. Usually development of a web application does not realize that their web application has vulnerabilities. They only realize it when there is an attack or manipulation of their code by someone. Even though SQL Injection is very easy to protect against, there are still large numbers of the system on the internet are vulnerable to this type of attack because there will be a few subtle conditions that can go undetected. Therefore, this paper proposes a detection model for detecting and recognizing the web vulnerabilities.
International journal of computer applications, 2022
Web applications are the backbone of technology in the global era of information. In this digital world connecting many commercial organizations that utilize the internet for financial transactions, education, and other activities. In recent days, web applications have been exploited by attackers frequently. Most web developers and website owners have limited awareness of the vulnerabilities in their websites,which are prone to web vulnerability attacks. Many researchers are working to detect and mitigate the vulnerability and provide differentmethods to resolve the various types of web vulnerabilities. However, these solutions are insufficient since they often have restrictions and areinefficient to prevent all vulnerabilities. This paper aims to reviewexisting detection and mitigation methodsfor web application vulnerabilities.This will helppractitioners to develop practices and solve issues related to web vulnerabilities.
International Journal of Computer Science and Informatics, 2012
Web applications have become critical part of business. They hold a treasure trove of data behind their front ends. Now-adays attackers are well aware of the valuable information accessible through web applications, so website security has become a major problem today. The number of vulnerabilities have multiplied in recent years. Vulnerabilities like cross site scripting(XSS),sql injection and cross site request forgery(CSRF) has emerged as a major threat to web applications. So, in order to protect web applications from these modern threats, at first vulnerability assessment should be carried out from time to time and also some preventive techniques should be followed to prevent these threats. The motivation of this paper is to promote the use of automated tools for vulnerability assessment and to follow preventive techniques in order to make web applications secure.
2017
Internet provides more essential services including Banking, E-Commerce, Social Networking, Education, Blogging, Medicine and Defense application. Web applications form the backbone of the modern Internet. Web application vulnerabilities are dangerous for Organizations as they risk not only brand and reputational damage. Due to data breaches, loss of business data records increased more than 400% over the past three years. Threats come in many shapes and sizes. It needs high level security services which are essential for the socio-eco growth of the society. Online Vulnerability Scanner is a tool which is capable to identify current and emerging patterns in the web application vulnerabilities. This paper presents a detailed study of recent web application Vulnerabilities and aims to shed a light on the state of web and perimeter network security based on the analysis.
IRJET, 2020
Web applications are a universal way to access information in today's world. Since the number of people using the internet rises exponentially every day, along with that the attacks that can be performed on web applications also rises, so security is becoming a very serious issue in web applications in today's world. Developers and researchers have found a lot of mitigations and protective measures for web application attacks on both client side and server side, and there are also many approaches to detect attacks that can be possible on websites and prevent them also. This paper provides various web application attacks which are very popular these days like cross site scripting (XSS) attack, Commerce attacks, SQL injection attacks and Distributed Denial of Service attacks, the preventive measures and mitigations that can be taken to prevent these attacks.
International Journal of Engineering Research and Technology (IJERT), 2014
https://www.ijert.org/a-survey-of-intrusion-detection-system-for-web-application https://www.ijert.org/research/a-survey-of-intrusion-detection-system-for-web-application-IJERTV3IS10794.pdf Web applications provide massively large facilities to the users. As the usability and popularity of the web applications have increased so as various types of attacks over it. In this paper we discuss various attacks like SQL injection attacks, Cross Site Scripting attacks, Privilege Escalation attack etc. and some of the methodologies to overcome it. Attacks are possible in on any web applications due to various reasons like ambiguous coding methods, design level flaws, web application configuration errors, validation error in user input etc. Different approaches have been implemented based on signatures of these attacks. Even though various intrusion detection systems are present, attacks continues to prevail.
Neolithic Stone Balls, 2023
New Theory published on the Neolithic stone balls or petrospheres found in Scotland, Ireland, and Norway that have puzzled archaeologists for centuries. A practical explanation for these objects may finally be revealed, showing their potential links to the first astronomical clocks and the development of modern timekeeping. Crichton E M Miller FCILT is an author, researcher, and Fellow of the Chartered Institute of Logistics and Transport who patented and published the pre-Christian wheel or sun cross as a spherical inclinometer for navigation, surveying, and astronomy in the Bronze Age using the Neolithic stone balls as a plumb bob in his book, The Golden Thread of Time. While researching navigation methods during the European Bronze Age, Miller recently carried out experiments at the autumn equinox on Scotland's West coast in 2022, using models of the mysterious stone balls found in Scotland, Ireland, and Norway. The result exposes spherical sun dials combined with solar and lunar highlights on a wetted surface in combination with cup and ring marks using analemmas in ancient astronomical time keeping, potentially for navigation purposes in early logistics and transport during the Chalcolithic and Bronze Ages. Astronomical Clocks Time was once kept only by observing the stars, sun, and moon, eventually leading to the invention of the first astronomical clock at Padua, Italy in the 14th Century. This clock resulted from measuring the motions of the earth, sun, and moon against the ecliptic zodiac and helped develop the Gregorian Calendar for civil timekeeping.
Temas Relevantes no Direito de Energia Elétrica (vol. V), 2016
ANEEL resolveu reabrir a Audi ência P'blica n instaurada originariamente no ano de a qual tinha por objetivo colher subsídios para a revisão da Resolução Normativa da ANEEL n do ano de Citada Resolução aprova procedimentos para regular a imposição de penalidades aos concessionários permissio nários autorizados e demais agentes de instalações e serviços de energia elétrica bem como às entidades responsáveis pela operação do sistema pela comercialização de energia elétrica e pela gestão de recursos prove nientes de encargos setoriais
Jurnal Kajian Budaya dan Spiritualitas, 2024
Research result. Pedagogy and Psychology of Education, 2020
Етнічна історія народів Європи, № 69, 2023
University of Juba, 2023
Hispanic Review, 1990
European Journal of Psychotraumatology, 2021
African Journal of Food, Agriculture, Nutrition and Development, 2023
Environmental Engineering and Management Journal, 2021
Japanese Journal of Gastroenterology and Hepatology , 2023
Italian Journal of …, 2010
European Chemical Bulletin, 2014
Social Science Research Network, 2014
Information, 2024
BMC Cancer, 2017
Proceedings of the National Academy of Sciences, 1992