scholarly journals Programmer Protocol for Identification and Defense of Latest Web Application Security Threats using Open Source Tools

2013 ◽  
Vol 76 (13) ◽  
pp. 24-32
Author(s):  
Devang Sharma
2021 ◽  
Vol 1 ◽  
pp. 84-90
Author(s):  
Rustam Kh. Khamdamov ◽  
◽  
Komil F. Kerimov ◽  

Web applications are increasingly being used in activities such as reading news, paying bills, and shopping online. As these services grow, you can see an increase in the number and extent of attacks on them, such as: theft of personal information, bank data and other cases of cybercrime. All of the above is a consequence of the openness of information in the database. Web application security is highly dependent on database security. Client request data is usually retrieved by a set of requests that request the application user. If the data entered by the user is not scanned very carefully, you can collect a whole host of types of attacks that use web applications to create security threats to the database. Unfortunately, due to time constraints, web application programmers usually focus on the functionality of web applications, but only few worry about security. This article provides methods for detecting anomalies using a database firewall. The methods of penetration and types of hacks are investigated. A database firewall is proposed that can block known and unknown attacks on Web applications. This software can work in various ways depending on the configuration. There are almost no false positives, and the overhead of performance is relatively small. The developed database firewall is designed to protect against attacks on web application databases. It works as a proxy, which means that requests for SQL expressions received from the client will first be sent to the developed firewall, rather than to the database server itself. The firewall analyzes the request: requests that are considered strange are blocked by the firewall and an empty result is returned to the client.


2019 ◽  
Vol 15 (10) ◽  
pp. 1341-1354 ◽  
Author(s):  
Vincent Appiah ◽  
Michael Asante ◽  
Isaac Kofi Nti ◽  
Owusu Nyarko-Boateng

2010 ◽  
Author(s):  
Márcio Macêdo ◽  
Ricardo Queiroz ◽  
Julio Damasceno

The purpose of this article is describe a solution for web application security based on an application firewall which is implemented using a model called reverse proxy. The application firewall use as much the model of negative filter as the model of positive filter for, apart from providing applications with more security, avoiding the occurrence of false positive what could filter applications authentic packets. This way, the firewall aggregates both the easy configuration of the negative security model with the better security provided by positive model.


Computer ◽  
2017 ◽  
Vol 50 (6) ◽  
pp. 81-85 ◽  
Author(s):  
Hsiu-Chuan Huang ◽  
Zhi-Kai Zhang ◽  
Hao-Wen Cheng ◽  
Shiuhpyng Winston Shieh

2017 ◽  
Vol 3 (1) ◽  
Author(s):  
Emerson Assis Carvalho ◽  
Fernanda Ramos de Carvalho ◽  
Lucyara Silva Ribeiro ◽  
Germano Estevam Simão Pereira ◽  
Túlio César Lopes Alves

This work presents a web application security overview, presenting its main concepts and areas, the open source resources available, the most com- mon web security vulnerabilities and how to prevent them. We also have used some open source web application security scanners to test the security of a simple web application. We have used more than one scanner, aiming to have a complete report over the vulnerabilities and to make a comparison between them. We have used a web application previously developed without any concern about security. Our reports were on the vulnerabilities found and how much was easy or not to interpret and fix them.


Sign in / Sign up

Export Citation Format

Share Document