2006
DOI: 10.2298/csis0602083j
|View full text |Cite
|
Sign up to set email alerts
|

Common web application attack types and security using ASP.NET

Abstract: Web applications security is one of the most daunting tasks today, because of security shift from lower levels of ISO OSI model to application level, and because of current situation in IT environment. ASP.NET offers powerful mechanisms to render these attacks futile, but it requires some knowledge of implementing Web application security. This paper focuses on attacks against Web applications, either to gain direct benefit by collecting private information or to disable target sites. It describes the two most… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2007
2007
2022
2022

Publication Types

Select...
3
2
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 4 publications
0
4
0
Order By: Relevance
“…Privilege escalation [40], password attack [41], advanced persistent threat [42], cryptojacking attack [43], web application attack [41], and so on critical security systems, and which adds to the additional security [3] type of method that identifies the deviations of protocol state. This approach is similar to the anomaly-based method, however, it uses predetermined universal profiles of benign protocol activity [54].…”
Section: Othersmentioning
confidence: 99%
“…Privilege escalation [40], password attack [41], advanced persistent threat [42], cryptojacking attack [43], web application attack [41], and so on critical security systems, and which adds to the additional security [3] type of method that identifies the deviations of protocol state. This approach is similar to the anomaly-based method, however, it uses predetermined universal profiles of benign protocol activity [54].…”
Section: Othersmentioning
confidence: 99%
“…[26]; • Zero-day attack is considered as the term that is used to describe the threat of an unknown security vulnerability for which either the patch has not been released or the application developers were unaware [4] [28]. Besides these attacks mentioned above, privilege escalation [29], password attack [30], insider threat [31], man-in-the-middle [32], advanced persistent threat [33], SQL injection attack [34], cryptojacking attack [35], web application attack [30] etc. are well-known as security incidents in the field of cybersecurity.…”
Section: Cyberattacks and Risksmentioning
confidence: 99%
“…Beside these attacks mentioned above, privilege escalation [29], password attack [30], insider threat [31], man-in-the-middle [32], advanced persistent threat [33], SQL injection attack [34], cryptojacking attack [35], web application attack [30] etc. are wellknown as security incidents in the field of cybersecurity.…”
Section: Cyberattacks and Security Risksmentioning
confidence: 99%