Study on Remote File Attacking – Inclusion & Detection
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2014, Vol 2, Issue 9
Abstract
Presently applications of web are increasing exponentially. We are almost totally dependent on Internet and associated technologies. Huge applications in all walk of lives are inviting attacks on them. Their usage are under constant by hackers that exploit their vulnerabilities to disrupt business and access confidential information. SQL Injection and Remote File Inclusion are the two most frequently used exploits and hackers prefer easier rather than complicated attack techniques. RFI is an overlooked menace. RFI attacks are more widespread than most assume. RFI attacks are today's most common security threat, accounting for more than 25% of all malicious sessions, far surpassing XSS (12%) and even exceeding SQLIs (23%). RFI uses the weakness of PHP language which in today’s world is the most widely used.
Authors and Affiliations
Bhawna Sinha| Research Scholar – IT B. R. Ambedkar Bihar University Muzaffarpur, Dr. D. K. Singh| Professor - Mathematics B. R. Ambedkar Bihar University Muzaffarpur, Dr. Pankaj Kumar| Head – Department of Electronics L. S. College, Muzaffarpur
A Complete System To Securely Outsource Log Records To A Cloud Provider
In View Of The Fact That Log Files Hold Record Of Most System Events Including User Activities They Turn Out To Be An Important Target For Malicious Attackers. An Attacker Breaking Into A System Normally Would Try No...
A Novel Approach For Using Multi-Keyword Ranked Search Scheme Over Encrypted in Secure And Dynamic Cloud Data
cloud computing have revamped the view of modern information technology which is motivating the data owners to outsource their data to the public cloud server like Amazon, Microsoft Azure, Google Drive, etc. With the...
BESS based Multi input inverter for Grid connected hybrid pv and wind power system
This paper proposes BESS based multi input inverter for grid connected hybrid PV and wind power system. This system will simplify the power system and reduce the cost. The proposed system consists of a battery system...
Self-assured Collective Data Transferring in Vehicular Ad Hoc Networks
Vehicular adhoc networks (VANETs) is the present innovation utilizing as a part of vehicles like cars and vans. Vehicles are considered as portable hubs in a MANET to make a versatile system likewise the most imperat...
A NOVEL HYBRID FEATURE EXTRACTION TECHNIQUE FOR FACE RECOGNITION
Face recognition is a computer for identifying and retrieving desired images from a large collection on the basis of features(color, texture, shape..).CBIR system is generally used in security, medicine, entertainment...