Multiple Prevention Techniques for Different Attacks in Web Application
Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 2
Abstract
"Nowadays Internet is spreading throughout the world in a boom. Internet provides us so many possible and daily chores sitting at home, office or any work place. But as a coin has two sides, Internet also has its disadvantages. Using Internet people known as hackers, frauders etc. can get access to the confidential data of any person sitting anywhere on this globe. We cannot assure that using internet could be safe or secure. In order to get access to the account, database of any person and hack the confidential data, hackers use different kind of attacks like SQL injection, cross site scripting, URL attack and cookies attack for the same. By these attacks, hackers may get the inaccessible information; they may even change the data and cause the theft. As these attacks are preventable and detectable, solution of these attacks are provided by this paper by rewriting the cookies with each and every process performed on the database, when we access it using Internet. The proposed system also detects and prevents attacks like XSS and SQLinjection to protect the restricted data from the attackers"
A High Quality Image Scaling Processor With Reduced Memory
The digital images can be resized and the process of doing it is called as image scaling. The applications such as sharpening of the image, image zooming, processing edge structures in an image etc, uses image scaling as...
Study and Analysis of Multiwavelet Transform with Threshold in Image Denoising: A Survey
Removing noise from the Medical image is still a challenging problem for researchers. Noise added is not easy to remove from the images. There have been several published algorithms and each approach has its assumptions,...
A Study on Perception and Usefulness of Seed Village Program for Soya Bean Crop among the Beneficiary Farmers of Indore Block of Indore District Madhya Pradesh, India
The word seed or seeds are used for all propagating materials. The seed is considered as most important input in agriculture. It is cheaper than other inputs like irrigation, fertilizer & plant protection measures. Quali...
A Survey on Encryption Methods for Providing Security in Pub/Sub System
Internet has changed the world of distributed computing significantly. Peer-to-peer communication mechanism making system more rigid and static applications in distributed system, making a way to loosely coupled infrastr...
Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques
"In the era of information and technology network security has become the core issue in every organizational network. There are many security mechanisms were used to provide the security to the network. This paper mainly...