Title :
Survey of Web Application Vulnerability Attacks
Author :
Ossama B. Al-Khurafi;Mohammad A. Al-Ahmad
Author_Institution :
Kulliyyah of Inf. &
Abstract :
Web applications have become an essential part of our daily life. Since web applications contain valuable sensitive information, hackers try to find vulnerabilities and exploit them in order to impersonate the user, steal information, or sabotage the application. This paper illustrates in detail the most prevailing and harmful web application vulnerability attacks: SQL Injection, Broken Authentication and Session Management, and Cross-Site Scripting (XSS).
Keywords :
"Databases","Authentication","Servers","Data mining","Encoding","Uniform resource locators"
Conference_Titel :
Advanced Computer Science Applications and Technologies (ACSAT), 2015 4th International Conference on
Print_ISBN :
978-1-5090-0423-2
DOI :
10.1109/ACSAT.2015.46