2015 International Conference on Soft-Computing and Networks Security (ICSNS) 2015
DOI: 10.1109/icsns.2015.7292382
|View full text |Cite
|
Sign up to set email alerts
|

Guarding web application with multi - Angled attack detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0
1

Year Published

2017
2017
2020
2020

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 9 publications
0
1
0
1
Order By: Relevance
“…При защите от атак типа «XSS в DOM», при которых сервер никогда не получает зловредный код (например, рассмотренная ранее атака через идентификатор #), обработка входных данных должна быть выполнена в коде на стороне клиента [25]. Это производится с помощью методов и свойств клиентского языка JavaScript.…”
Section: способы защиты от Xss-атакunclassified
“…При защите от атак типа «XSS в DOM», при которых сервер никогда не получает зловредный код (например, рассмотренная ранее атака через идентификатор #), обработка входных данных должна быть выполнена в коде на стороне клиента [25]. Это производится с помощью методов и свойств клиентского языка JavaScript.…”
Section: способы защиты от Xss-атакunclassified
“…Also, Studied various methods used for exploitation, testing areas and security method and tools including different algorithms which are being used [1][2] [3].For preventing from the LFI attack also the various vulnerabilities and methods of LFI attacks [4].For studying more about RFI attack we have studied the RFI botnet [8].To learn more about attackers perspective and why attacker choose RFI type of vulnerability we have studied different types of exploits and learnt how the attacker gains root shell access and admin passwords [7] Begum et.al.presentthe LFI exploitation based on RFI and SQLi.To prevent from attacks sensitive information like root user ,password ,SSH login credentials are disclosed by the system.We have also learned methods used for exploitation such as get method and post method exploitation.This paper imposes security feature which developers usually design data processing technology through HTTP POST method.Different types of files are stored in different directories to ensure security.Also ,we have studied various methods used for exploitation and security.LFI and RFI are vulnerabilities which we have concentrated on. LFI is nothing but web application's vulnerability which allows a user to include different files located in web application on server machine.RFI is one of the weaknesses in a web application by which it remotely accepts any type of user input.…”
Section: Literature Surveymentioning
confidence: 99%