[go: up one dir, main page]

Sharma - Google Patents

Final Report of the work done on the Major UGC Research Project

Sharma

View PDF
Document ID
484194912327093474
Author
Sharma L

External Links

Snippet

Most common security tools that companies have in place, such as firewalls, intrusion detection systems, access controls do not address the issue of application vulnerabilities [1, 16]. Over the last few years most of the attacks are targeting the application directly …
Continue reading at www.jammuuniversity.ac.in (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Similar Documents

Publication Publication Date Title
US20230362189A1 (en) System and method for strategic anti-malware monitoring
Nawrocki et al. A survey on honeypot software and data analysis
Prokhorenko et al. Web application protection techniques: A taxonomy
Salas et al. Security testing methodology for vulnerabilities detection of xss in web services and ws-security
Stasinopoulos et al. Commix: automating evaluation and exploitation of command injection vulnerabilities in web applications
US8997236B2 (en) System, method and computer readable medium for evaluating a security characteristic
Patel A survey on vulnerability assessment & penetration testing for secure communication
Ravindran et al. A Review on Web Application Vulnerability Assessment and Penetration Testing.
Tanakas et al. A novel system for detecting and preventing SQL injection and cross-site-script
Kollepalli et al. An Experimental Study on Detecting and Mitigating Vulnerabilities in Web Applications.
Fredj Spheres: an efficient server-side web application protection system
Barnett Web Application Defender's Cookbook: Battling Hackers and Protecting Users
Auxilia et al. Anomaly detection using negative security model in web application
Ezeife et al. SensorWebIDS: a web mining intrusion detection system
Sommestad et al. A test of intrusion alert filtering based on network information
Liang et al. Internet's Invisible Enemy: Detecting and Measuring Web Cache Poisoning in the Wild
Frank Jr Mirai bot scanner summation prototype
Pantoulas Description, analysis and implementation of a Web Application Firewall (WAF). Creation of attack scenarios and threats prevention
Sharma Final Report of the work done on the Major UGC Research Project
Madhusudhan Cross channel scripting (xcs) attacks in web applications: Detection and mitigation approaches
Wang et al. RW‐Fuzzer: A Fuzzing Method for Vulnerability Mining on Router Web Interface
Everson Cyber attack surface mapping for offensive security testing
Blomberg Securing Internet of Things with web application firewall
Sheikh Hacking Web Applications
SUNNY et al. Enhancing Network Security through Investigative Traffic Analysis: A Case Study