RUNTIME MONITORING TECHNIQUE TO HANDLE TAUTOLOGY BASED SQL INJECTION ATTACKS

2012; Volume: 1; Issue: 3 Linguagem: Inglês

ISSN

2305-0012

Autores

Ramya Dharam, Sajjan G. Shiva,

Tópico(s)

Digital and Cyber Forensics

Resumo

Over the recent years our dependence on web applications has increased drastically in our everyday routine activities. Therefore, we expect these web applications to be secure and reliable when we are paying bills, shopping online, making transactions etc. These web applications consist of underlying databases containing confidential user’s data like financial information records, medical information records, and personal information records, which are highly sensitive and valuable. This in turn makes web applications an ideal target for attacks. Some of the attacks targeted on web applications include SQL Injection Attacks (SQLIAs), Cross-Site Scripting (CSS), Cross-Site Request Forgery (CSRF), Path Traversal Attacks, etc.

Referência(s)