Sharma - Google Patents
Final Report of the work done on the Major UGC Research ProjectSharma
View PDF- Document ID
- 484194912327093474
- Author
- Sharma L
External Links
Snippet
Most common security tools that companies have in place, such as firewalls, intrusion detection systems, access controls do not address the issue of application vulnerabilities [1, 16]. Over the last few years most of the attacks are targeting the application directly …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20230362189A1 (en) | System and method for strategic anti-malware monitoring | |
Nawrocki et al. | A survey on honeypot software and data analysis | |
Prokhorenko et al. | Web application protection techniques: A taxonomy | |
Salas et al. | Security testing methodology for vulnerabilities detection of xss in web services and ws-security | |
Stasinopoulos et al. | Commix: automating evaluation and exploitation of command injection vulnerabilities in web applications | |
US8997236B2 (en) | System, method and computer readable medium for evaluating a security characteristic | |
Patel | A survey on vulnerability assessment & penetration testing for secure communication | |
Ravindran et al. | A Review on Web Application Vulnerability Assessment and Penetration Testing. | |
Tanakas et al. | A novel system for detecting and preventing SQL injection and cross-site-script | |
Kollepalli et al. | An Experimental Study on Detecting and Mitigating Vulnerabilities in Web Applications. | |
Fredj | Spheres: an efficient server-side web application protection system | |
Barnett | Web Application Defender's Cookbook: Battling Hackers and Protecting Users | |
Auxilia et al. | Anomaly detection using negative security model in web application | |
Ezeife et al. | SensorWebIDS: a web mining intrusion detection system | |
Sommestad et al. | A test of intrusion alert filtering based on network information | |
Liang et al. | Internet's Invisible Enemy: Detecting and Measuring Web Cache Poisoning in the Wild | |
Frank Jr | Mirai bot scanner summation prototype | |
Pantoulas | Description, analysis and implementation of a Web Application Firewall (WAF). Creation of attack scenarios and threats prevention | |
Sharma | Final Report of the work done on the Major UGC Research Project | |
Madhusudhan | Cross channel scripting (xcs) attacks in web applications: Detection and mitigation approaches | |
Wang et al. | RW‐Fuzzer: A Fuzzing Method for Vulnerability Mining on Router Web Interface | |
Everson | Cyber attack surface mapping for offensive security testing | |
Blomberg | Securing Internet of Things with web application firewall | |
Sheikh | Hacking Web Applications | |
SUNNY et al. | Enhancing Network Security through Investigative Traffic Analysis: A Case Study |