sql injections
Recently Published Documents


TOTAL DOCUMENTS

14
(FIVE YEARS 5)

H-INDEX

3
(FIVE YEARS 0)

2021 ◽  
pp. 95-113
Author(s):  
Manuel Del Verme ◽  
Åvald Åslaugson Sommervoll ◽  
László Erdődi ◽  
Simone Totaro ◽  
Fabio Massimo Zennaro

2021 ◽  
pp. 125-137
Author(s):  
Ahmed Sheikh
Keyword(s):  

2021 ◽  
Vol 3 (11) ◽  
pp. 5-99
Author(s):  
Valerii Lakhno ◽  
Andrii Blozva ◽  
Borys Husiev ◽  
Tetiana Osypova ◽  
Yurii Matus

The development of computer networks is gaining momentum. There are new challenges to data security and the end users themselves. With the advent of the Internet of Things, this problem has become quite acute for network engineers and cyber analysts. Increasingly, there are illegal actions to interfere with the work of the network itself and the use of users' devices for criminal purposes. Various distributed attacks, SQL injections and identity theft are becoming more complex. Given the growing infrastructure of both the network and IoT devices, there is a need to protect them. Especially when it comes to the computer network of a higher education institution. Where little attention is usually paid to full infrastructure protection, and with the integration of IoT devices, such possible gaps can occur quite a lot. This article attempts to reveal theoretical approaches to the design and implementation of a computer network of higher education institutions, which in recent years are increasingly beginning to suffer from outside interference. Possible attacks on the infrastructure of higher education institutions are analyzed, as well as the possibility of attack and interference in the work of IoT devices based on the killer chain approach. Internet The possibility of using a web application firewall and appropriate software for security and incident management at the L5-L7 OSI level is considered in such networks. Preliminary testing of the network for the ability to respond to L3-L4 level attacks using standard firewall capabilities. And with the response to interventions at the upper levels of the OSI L5-L7 model, namely: SQL injections, distributed DDoS, bot-net attacks. The results are summarized and further directions of research are determined, which are based on the improvement of the group security policy for the higher education institution. Development of security infrastructure for IoT devices and the ability to respond quickly to non-standard attacks.


Author(s):  
S. A. Lesko

To facilitate the detection of various vulnerabilities, there are many different tools (scanners) that can help analyze the security of web applications and facilitate the development of their protection. But these tools for the most part can only identify problems, and they are not capable of fixing them. Therefore, the knowledge of the security developer is a key factor in building a secure Web resource. To resolve application security problems, developers must know all the ways and vectors of various attacks in order to be able to develop various protection mechanisms. This review discusses two of the most dangerous vulnerabilities in the field of Web technologies: SQL injections and XSS attacks (cross-site scripting – XSS), as well as specific cases and examples of their application, as well as various approaches to identifying vulnerabilities in applications and threat prevention. Cross-site scripting as well as SQL-injection attacks are related to validating input data. The mechanisms of these attacks are very similar, but in the XSS attacks the user is the victim, and in the SQL injection attacks, the database server of the Web application. In XSS attacks, malicious content is delivered to users by means of a client-side programming language such as JavaScript, while using SQL injection, the SQL database query language is used. At the same time, XSS attacks, unlike SQL injections, harm only the client side leaving the application server operational. Developers should develop security for both server components and the client part of the web application.


Sign in / Sign up

Export Citation Format

Share Document