Detecting SQL injection attacks using SNORT IDS

H Alnabulsi, MR Islam, Q Mamun - Asia-Pacific World Congress …, 2014 - ieeexplore.ieee.org
SQL injection attack poses a serious security threats among the Internet community
nowadays and it's continue to increase exploiting flaws found in the Web applications. In …

Protecting code injection attacks in intelligent transportation system

H Alnabulsi, R Islam - … On Trust, Security And Privacy In …, 2019 - ieeexplore.ieee.org
TMC (traffic management system) is the vital unit of Intelligent Transport System (ITS) as it
provides complex services by interacting with other smart devices, objects and infrastructure …

[PDF][PDF] A survey on detection and prevention techniques for SQL injection attacks

H Dehariya, PK Shukla, M Ahirwar - International Journal of …, 2016 - researchgate.net
In this current scenario web application are widely using for various purpose like online
shopping, online money transfer, e-bill payment, online mobile recharges etc. As per …

Exploring the use of Iptables as an Application Layer Firewall

N Gandotra, LS Sharma - Journal of The Institution of Engineers (India) …, 2020 - Springer
Application layer attacks pose as a grievous threat to the valuable information stored at Web
servers for its illegitimate access. These attacks exploit certain protocols being used by an …

Websites' Input Validation and Input-Misuse-Based Attacks

I Alsmadi, I Alazzam - 2016 Cybersecurity and Cyberforensics …, 2016 - ieeexplore.ieee.org
Websites typically include many forms or web elements that allow users to enter and submit
data. This data will be eventually executed in the back-end databases. Users can …

Visual media as a factor in the mental health of today's youth

H Abanina, S Baqri - … , Law and Education Research (ELER 2021 …, 2021 - atlantis-press.com
The peculiarities of the influence of visual media on the mental health of the individual are
considered, in particular the relationship between the active use of retouched body images …

Improving heuristics of optimal perception planning using visibility maps

T Pereira, A Moreira, M Veloso - 2016 International Conference …, 2016 - ieeexplore.ieee.org
In this paper we consider the problem of motion planning for perception of a target position.
A robot has to move to a position from where it can sense the target, while minimizing both …

SQL Injection Attack on Web Application

S Parameswari, K Kavitha - Asian Journal of Computer Science and …, 2018 - ajcst.co
SQL injection attacks are one of the highest dangers for applications composed for the Web.
These attacks are dispatched through uncommonly made client information on web …

Self-adaptation to concept drift in web-based anomaly detection

J Orij - 2016 - essay.utwente.nl
Attacks on web applications that utilize the HTTP request line and request body as attack
vectors are amongst the most prevailing web-based attacks in the wild. For anomaly-based …

[PDF][PDF] A Survey on SQL Injection Attacks Techniques

N Bhoomla, PP Singh, V Srivastava - researchgate.net
Web applications are widely using nowadays. In these web applications, most of those that
are based on money transaction like on-line baking, e-shopping, on-line bill payment …