首页> 外文期刊>Computer Engineering and Intelligent Systems >An Analysis of Various Methods to Identify Web Based Applications Vulnerabilities
【24h】

An Analysis of Various Methods to Identify Web Based Applications Vulnerabilities

机译:识别基于Web的应用程序漏洞的各种方法的分析

获取原文
           

摘要

Recently Web based applications takes a noteworthy palace in people’s daily routine furthermore as in progress of nation’s different domains as well. Web based applications have undergone a reasonably express improvement within the last few decades and their appreciation is moving faster than that was predictable few years ago. Presently, huge volumes of transactions are prepared online using various Web based applications. Even though these Webs based applications are utilized by a lot of people, in some cases the defense level is vulnerable, and that compiles them prone to obtain negotiation. In most of the eventualities, a client has to be recognized previous to any contact is set upped with the backend data. A precipitate client shouldn't be permitted entrée to the scheme without legal credentials. However, a crafted injection query provides illegal entrée to illegal clients. This is regularly accomplished via SQL Injection input. In spite of the occurrence of dissimilar procedures to discover and avoid SQL injection, still there stays a shocking threat into Web based applications. While working on this paper, we studied and did analysis on various manners of SQL Injection vulnerabilities, different types of assaults, and their recognition and avoidance techniques. Flanking we present our assessment of this analysis. We also clarified future research direction for probabilities and possible expansion of challenge proceedings against different web application attacks.
机译:随着国家不同领域的发展,基于Web的应用程序最近在人们的日常生活中占据了重要的位置。在过去的几十年中,基于Web的应用程序已经有了相当明显的改进,并且其欣赏的发展速度比几年前可以预见的要快。当前,使用各种基于Web的应用程序在线准备大量交易。即使这些基于Web的应用程序被很多人使用,但在某些情况下,防御级别仍然很脆弱,并且编译它们很容易获得协商。在大多数情况下,必须先识别客户端,然后再设置后端数据。没有合法资格的情况下,不得允许未成年人委托人加入该计划。但是,精心设计的注入查询会向非法客户提供非法条目。这通常通过SQL注入输入来完成。尽管发现和避免SQL注入的过程互不相同,但对基于Web的应用程序仍然存在令人震惊的威胁。在撰写本文时,我们研究了各种形式的SQL Injection漏洞,不同类型的攻击以及它们的识别和避免技术,并进行了分析。在侧面,我们提出了对该分析的评估。我们还阐明了针对概率以及针对不同Web应用程序攻击的挑战性程序可能扩展的未来研究方向。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号