Affiliation:
1. Deakin University, Australia
Abstract
Web applications have steadily increased, making them very important in areas, such as financial sectors, e-commerce, e-government, social media network, medical data, e-business, academic an activities, e-banking, e-shopping, e-mail. However, web application pages support users interacting with the data stored in their website to insert, delete and modify content by making a web site their own space. Unfortunately, these activities attracted writers of malicious software for financial gain, and to take advantage of such activities to perform their malicious objectives. This chapter focuses on severe threats to web applications specifically on Structure Query Language Injection Attack (SQLIA) and Zeus threats. These threats could adopt new obfuscation techniques to evade and thwart countermeasures Intrusion Detection Systems (IDS). Furthermore, this work explores and discusses the techniques to detect and prevent web application malware.
Reference30 articles.
1. Information security economics–And beyond.;R.Anderson;Advances in Cryptology-CRYPTO,2007
2. Bandhakavi, S., Bisht, P., Madhusudan, P., & Venkatakrishnan, V. (2007). CANDID: Preventing sql injection attacks using dynamic candidate evaluations. ACM Conference on Computer and Communications Security (pp. 12-24).
3. Barnes, K., Marateo, R. C., & Ferris, S. P. (2007). Teaching and learning with the net generation. Innovate Journal of Online Education, 3(4).
4. Binsalleeh, H., Ormerod, T., Boukhtouta, A., Sinha, P., Youssef, A., Debbabi, M., & Wang, L. (2010, 17-19 August). On the analysis of the Zeus botnet crimeware toolkit. Paper presented at the Privacy Security and Trust (PST).
5. CANDID
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献