43rd Annual 2009 International Carnahan Conference on Security Technology 2009
DOI: 10.1109/ccst.2009.5335560
|View full text |Cite
|
Sign up to set email alerts
|

Optimum tuning of defense settings for common attacks on the web applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 1 publication
0
4
0
Order By: Relevance
“…Unlike traditional desktop systems, web applications suffer native vulnerabilities due to their architecture and also due to the fact that they are exposed to a wider audience. Recently research indicates that among all attacks, SQL Injection and Cross-Site Scripting attack are the most common and most serious attacks [11].…”
Section: Risks Affecting Web Applicationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Unlike traditional desktop systems, web applications suffer native vulnerabilities due to their architecture and also due to the fact that they are exposed to a wider audience. Recently research indicates that among all attacks, SQL Injection and Cross-Site Scripting attack are the most common and most serious attacks [11].…”
Section: Risks Affecting Web Applicationsmentioning
confidence: 99%
“…Cross-Site Scripting is mainly intended to attack the user of a website and by utilizing the property of the website that allows users to enter data [11]. Here a hacker enters part of HTML syntax or Java/VB Script syntax as a data in a data entry form such as a blog page.…”
Section: Inherent Weakness Of Web Scriptmentioning
confidence: 99%
“…Future work includes plans to analyze the possibility of merging WASP with current Open Source Web Application Firewalls (WAF) [42]- [45]. WAF is a technique that is worthy of future research, considering there is little information on how to create a WAF, how to use a WAF, or how to configure a WAF.…”
Section: Future Workmentioning
confidence: 99%
“…A study suggests that SQL Injection and cross-web site scripting are the most usual and most critical assaults (Tsai et al , 2009). These pages often contain scripting code to be executed dynamically within a web browser.…”
Section: Web Application Overviewmentioning
confidence: 99%