Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2016, Communications and Network
…
9 pages
1 file
The rapid advancement in technology and the increased number of web applications with very short turnaround time caused an increased need for protection from vulnerabilities that grew due to decision makers overlooking the need to be protected from attackers or software developers lacking the skills and experience in writing secure code. Structured Query Language (SQL) Injection, cross-site scripting (XSS), Distributed Denial of service (DDos) and suspicious user behaviour are some of the common types of vulnerabilities in web applications by which the attacker can disclose the web application sensitive information such as credit card numbers and other confidential information. This paper proposes a framework for the detection and prevention of web threats (WTDPF) which is based on preventing the attacker from gaining access to confidential data by studying his behavior during the action of attack and taking preventive measures to reduce the risks of the attack and as well reduce the consequences of such malicious action. The framework consists of phases which begin with the input checking phase, signature based action component phase, alert and response phases. Additionally, the framework has a logging functionality to store and keep track of any action taking place and as well preserving information about the attacker IP address, date and time of the attack, type of the attack, and the mechanism the attacker used. Moreover, we provide experimental results for different kinds of attacks, and we illustrate the success of the proposed framework for dealing with and preventing malicious actions.
With the widespread use of web applications, the creation of them has also become easier. While the developers of web applications focus more on the expectations from the application, they may disregard the security of the application. The increase in the use of web applications caused an increase in the amount and types of attacks to these applications. Web security might gain much importance according to how critical are the work done and the data processed by the web application. There is need for security systems which detect the attacks, prevent the attacks and remove vulnerabilities before or during an attack. Excess number of attack techniques and newly emerging attacks constitute a problem for the security of web applications. In this study, types of web attacks and the methods used for preventing these attacks are primarily examined. Also, the creation of a web security infrastructure model which utilizes various techniques in order to decrease the effect of web attacks is aimed. The attacks which are reputed to be the most critical among the types of web attacks are investigated. The techniques and methods to provide security are examined and the infrastructure model which utilizes the techniques that will achieve maximum security is aimed to be created.
Information Management & Computer Security, 2011
Web application security is critical in the design and evaluation of web applications, since most web applications increasingly store various types of sensitive data related to their users. Nowadays, sensitive data such as financial information, medical information or personal data, especially in social web applications, are exposed over the networks so it seems quite appealing to hack these applications and leak information to unauthorized users. This paper introduces a new tool which efficiently detects and prevents common web attacks based on input validation. This is accomplished through pattern recognition in a flexible and expandable way. Finally, a comparison to existing web application firewalls is presented showing the high applicability and usefulness of the new tool being introduced.
International Journal of Computer Science and Informatics, 2012
Web applications have become critical part of business. They hold a treasure trove of data behind their front ends. Now-adays attackers are well aware of the valuable information accessible through web applications, so website security has become a major problem today. The number of vulnerabilities have multiplied in recent years. Vulnerabilities like cross site scripting(XSS),sql injection and cross site request forgery(CSRF) has emerged as a major threat to web applications. So, in order to protect web applications from these modern threats, at first vulnerability assessment should be carried out from time to time and also some preventive techniques should be followed to prevent these threats. The motivation of this paper is to promote the use of automated tools for vulnerability assessment and to follow preventive techniques in order to make web applications secure.
Ijca Proceedings on International Conference on Recent Advances and Future Trends in Information Technology, 2012
The Internet, which can be defined as a huge network of networks-both wired and wireless, uses the Internet Protocol Suite (TCP/IP) to make information available beyond geographical boundaries. Computing devices all through the world connect to the World Wide Web via the Client Server architecture. In this architecture, the client requests some information from a web server through a web browser. The web server connects to a database server in turn to fetch data. The connection between the web server and the database is the one that needs to be well secured. This is where the role of secure authentication techniques comes into picture. Nowadays, Cyber-crimes are becoming rampant. These include illegal access of data, illegal interception of data, eavesdropping of unauthorized data over an information technology infrastructure, etc. Popular Web attacks include Spam, Phishing Attacks, Information warfare, Nigerian Scams, and Denial-of-Service attacks. At some or the other stage, most of these are ramifications of web attacks and SQL attackspractical implementation of an advanced analysis and prevention technique of which is explained in this paper. It uses a multi-tier approach which makes web applications retain their simplicity for the user and complexity for the attacker.
Procedia Technology, 2012
The Internet can be defined as a global system of interconnected networks (wired/wireless) that use a Standard Internet Protocol Suite (Transmission Control Protocol/IP) to serve information worldwide. The client server architecture defines the way in which computing devices all over the world connect to the World Wide Web. In this architecture, the client requests some information from a web server through a web browser. The web server connects to a database server in turn to fetch data. The connection between the web server and the database is the one that needs to be well secured. This is where the role of secure authentication techniques comes into picture. Cyber-crimes are immoral actions that include illegal access of data, illegal interception of data, eavesdropping of unauthorized data over an information technology infrastructure, etc. There are various kinds of cyber-crimes such as Web attacks, Spam, Phishing Attacks, Information Warfare, Nigerian Scams, and DOS Attacks. At some or the other stage, most of these are ramifications of web attacks-an advanced prevention technique of which is explained in this paper. The proposed methodology utilizes a multi-tier mechanism to detect SQL attacks while maintaining the speed and user experience of the web application. The layered approach ensures that a genuine user would never feel that such a security mechanism was in place, while making it extremely difficult for intruders to break in.
Security is a major concern for the modern age systems, network, and database administrators. Recently there has been a remarkable interest by both professional and scientific committee about identifying and detecting tacks while also making all possible actions to enhance security. Many models and frameworks are proposed in literature, however few have updated list of actions adapted to types of attacks. This paper presents an effective framework that classifies and detects the different types of attacks along with their symptoms and features. Such a researcher has clearly tested and evaluated a common twelve types of attacks the research has covered and analyzed a survey which spanned over 25 Web developers working with dynamic websites. Numbers of important observation and results were validated which are centered on the weakness of the applied protection mechanisms. The research presents a logical framework a long with guideline criteria that enable fast detection of the common attacks and detective a set of actions that enhance protection and security of dynamic websites.
International Journal of Engineering Research & Technology (IJERT), 2022
Web Applications are sensitive to information security threats due to the adequate information it obtains from the users. Retaining data through web applications is the most effective thing in this day and age. Wrongly received data can be utilized to exploit a business which can be devastating, both in financial and reputational deterioration. The use of online transactions through web-based applications has resulted in numerous vulnerabilities that have been systemically analyzed by the Open Web Application Security Project (OWASP). So, it is required to raise the attention of newly developed web applications and developers. This work analysis the appropriate content about sixteen of the top web application’s vulnerabilities, i.e., Persistent cross-site scripting, Blind SQL injection, Session hijacking, Vulnerability scanning tools, DOT.NET deserialization, Bypassing REGEX restrictions, Magic hashes, Bypassing XSS Length Limitations, DOM-based cross-site scripting, Server-side template injection, Remote Code Execution, File upload limits and file extension filters, XML External Entity (XXE) Injection, Data Exfiltration, PHP programmer juggles with sloppy comparisons and PHP/CF type juggling with loose comparisons. The review has been performed for significant vulnerabilities. Also, analysis the web attacks mechanism as vulnerabilities. This research shows the impact of vulnerabilities as findings for Web applications. One of the primary objectives of this analysis is to discuss mitigation techniques- provide specific solutions to identify and defend multiple vulnerabilities. Therefore, application developers can increase awareness and investigate fundamental ways to improve the security of existing web applications
There are millions of websites in the world now but it has been observed since very long time that Web Security has been one of most important areas of research whether be it either analysis or detection and later developing to mitigation plans. Web security threats are very much present now days and they have undergone much sophistication comparing to their initial phase. Now they are becoming more & more evolved each day. The evolution of threat on websites might be in terms of new ways of attack or bringing in resistance to using simulated Operating Systems or VM ware environments. Also, there has been considerable shift in the target of attacks in recent years. Earlier, clients were ignored while choosing targets. But, in recent years client user has become the main target for attacks as the adversary believe that the end user is the weakest link in the security chain. This paper is presented here to study the issues related to web security in cyber world.
Archaeology and Early History of Ukraine, 2021
In the Archaic period, Mediterranean and Greek North Pontic imports, rather well represented in Early Scythian burials on the Lower Don, are practically unknown in the burials of the nomads in the Lower Volga and South Urals regions. The analysis of archaeological sources shows that in the second half of the 4th century BC imported beads and pendants made of glass, frit and amber reach the nomads of the Lower Volga and South Urals, and a little later, at the turn of the 4th and in the first third of the 3rd century BC — in addition, Greek pottery and possibly vessels made of precious metals, alabaster and onyx. Olbian bronze «borystheni» of the late 4th—3rd centuries BC also were found into the Lower Volga region. If for the 5th and most part of the 4th century BC. imports that entered the South Urals were mainly represented by products of the Achaemenid circle, then after the fall of the Achaemenid state and the resulting geopolitical changes in the Lower Volga region and the South...
In meinem Aufsatz wird das Problem des Übergangs zur Natur in Hegels Wissenschaft der Logik und seiner Vorbereitung in der WdL diskutiert. Die Übergänge innerhalb der WdL sollen gegenüber dem Übergang in die Natur- als Realphilosophie abgegrenzt werden. Sie dienen als Verdichtung der logischen Kategorien bis zur Idee, dem absoluten Begriff. Danach erfolgt sozusagen ein abgelöster Übergang in die Natur, da diese nicht als Idee in der WdL abgebildet werden kann, denn die Idee diszerniert sich in die Natur, bleibt in den natureigenen Kategorien allerdings erhalten. Erst der Geist im zweiten realphilosophischen Raum befreit sich und die Natur, indem er die Ideen wieder freisetzt und auf dieser höchsten Ebene des hegelschen Systems neu verarbeitet.
Italian Studies, 2024
Hacia el Bicentenario de la Independencia (1821-2021): VII Congreso. El Real Convictorio de San Carlos y la difusión de las ideas de libertad, 2019
Cadernos de Pesquisa, 2016
Ets Educare - Revista de Educação e Ensino, 2024
Communications of the ACM, 1984
POLITIKA- The Israeli Journal of Political Science and International Relations , 2022
Physics & Astronomy International Journal
Tramas y Redes, 2024
SER Y PODER SER DE EUROPA, 2021
Diálogo Andino, 2017
Jurnal Mitra Manajemen, 2020
Analytical Biochemistry, 2003
Journal of Crystal Growth, 2010
International Journal of Applied Engineering Education, 1989
The Journal of the Petrological Society of Korea, 2013
Saúde em Redes
Journal of the Neurological Sciences, 2013
Marksist Araştırmalar (MAR), 2024