RUNTIME MONITORING TECHNIQUE TO HANDLE TAUTOLOGY BASED SQL INJECTION ATTACKS
2012; Volume: 1; Issue: 3 Linguagem: Inglês
ISSN
2305-0012
AutoresRamya Dharam, Sajjan G. Shiva,
Tópico(s)Digital and Cyber Forensics
ResumoOver the recent years our dependence on web applications has increased drastically in our everyday routine activities. Therefore, we expect these web applications to be secure and reliable when we are paying bills, shopping online, making transactions etc. These web applications consist of underlying databases containing confidential user’s data like financial information records, medical information records, and personal information records, which are highly sensitive and valuable. This in turn makes web applications an ideal target for attacks. Some of the attacks targeted on web applications include SQL Injection Attacks (SQLIAs), Cross-Site Scripting (CSS), Cross-Site Request Forgery (CSRF), Path Traversal Attacks, etc.
Referência(s)