DocumentCode :
3775258
Title :
Survey of Web Application Vulnerability Attacks
Author :
Ossama B. Al-Khurafi;Mohammad A. Al-Ahmad
Author_Institution :
Kulliyyah of Inf. &
fYear :
2015
Firstpage :
154
Lastpage :
158
Abstract :
Web applications have become an essential part of our daily life. Since web applications contain valuable sensitive information, hackers try to find vulnerabilities and exploit them in order to impersonate the user, steal information, or sabotage the application. This paper illustrates in detail the most prevailing and harmful web application vulnerability attacks: SQL Injection, Broken Authentication and Session Management, and Cross-Site Scripting (XSS).
Keywords :
"Databases","Authentication","Servers","Data mining","Encoding","Uniform resource locators"
Publisher :
ieee
Conference_Titel :
Advanced Computer Science Applications and Technologies (ACSAT), 2015 4th International Conference on
Print_ISBN :
978-1-5090-0423-2
Type :
conf
DOI :
10.1109/ACSAT.2015.46
Filename :
7478735
Link To Document :
بازگشت