Multiple Prevention Techniques for Different Attacks in Web Application

Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 2

Abstract

"Nowadays Internet is spreading throughout the world in a boom. Internet provides us so many possible and daily chores sitting at home, office or any work place. But as a coin has two sides, Internet also has its disadvantages. Using Internet people known as hackers, frauders etc. can get access to the confidential data of any person sitting anywhere on this globe. We cannot assure that using internet could be safe or secure. In order to get access to the account, database of any person and hack the confidential data, hackers use different kind of attacks like SQL injection, cross site scripting, URL attack and cookies attack for the same. By these attacks, hackers may get the inaccessible information; they may even change the data and cause the theft. As these attacks are preventable and detectable, solution of these attacks are provided by this paper by rewriting the cookies with each and every process performed on the database, when we access it using Internet. The proposed system also detects and prevents attacks like XSS and SQLinjection to protect the restricted data from the attackers"

Authors and Affiliations

Keywords

Related Articles

Selenium Content in some Brands of Bottled Beer Marketed in Makurdi Town Benue State, Nigeria

Selenium Content in some Brands of Bottled Beer Marketed in Makurdi Town Benue State, Nigeria

Voice Based Image Transfer to USB using Arm 7

Voice Based Image Transfer to USB using Arm 7

Enhancing Security in Cloud Storage using ECC Algorithm

Security in cloud computing is an evolving area in today

Characterization of Knee Joint Diseases Using Medical Ultrasound and Magnetic Resonance Imaging

"Abstract Background: Ultrasound (US) has been advocated for the assessment of soft tissue supporting structures of the knee joint, because it's a simple, rapid, cheap, accurate method and well accepted by patient in com...

Threat Analysis of Readers’ Unit in Ibrahim Babangida Library of Modibbo Adama University of Technology, Yola , Analytic Hierarchy Process (AHP) Approach

This paper identified four human threats affecting Readers’ unit of Ibrahim Babangida Library (IBL) of Modibbo Adama University of Technology (MAUTECH), Yola. Data on threats were obtained using questionnaire and persona...

Download PDF file
  • EP ID EP356688
  • DOI -
  • Views 94
  • Downloads 0

How To Cite

(2015). Multiple Prevention Techniques for Different Attacks in Web Application. UNKNOWN, 4(2), -. https://europub.co.uk/articles/-A-356688