Nothing Special   »   [go: up one dir, main page]

Prokhorenko et al., 2016 - Google Patents

Web application protection techniques: A taxonomy

Prokhorenko et al., 2016

Document ID
10487809675284406980
Author
Prokhorenko V
Choo K
Ashman H
Publication year
Publication venue
Journal of Network and Computer Applications

External Links

Snippet

The growing popularity of web applications makes them an attractive target for malicious users. Large amounts of private data commonly processed and stored by web applications are a valuable asset for attackers, resulting in more sophisticated web-oriented attacks …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2119Authenticating web pages, e.g. with suspicious links
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Similar Documents

Publication Publication Date Title
Prokhorenko et al. Web application protection techniques: A taxonomy
US10592676B2 (en) Application security service
Fredj et al. An OWASP top ten driven survey on web application protection methods
Liu et al. A survey of exploitation and detection methods of XSS vulnerabilities
Chang et al. Analyzing and defending against web-based malware
Li et al. A survey on server-side approaches to securing web applications
Li et al. A survey on web application security
Nunan et al. Automatic classification of cross-site scripting in web pages using document-based and URL-based features
Johari et al. A survey on web application vulnerabilities (SQLIA, XSS) exploitation and security engine for SQL injection
Cova et al. Detection and analysis of drive-by-download attacks and malicious JavaScript code
Pan et al. Cspautogen: Black-box enforcement of content security policy upon real-world websites
Borgolte et al. Delta: automatic identification of unknown web-based infection campaigns
Sasi et al. A comprehensive survey on IoT attacks: Taxonomy, detection mechanisms and challenges
Zhang et al. Causality-based sensemaking of network traffic for android application security
Wang et al. A combined static and dynamic analysis approach to detect malicious browser extensions
Luh et al. AIDIS: Detecting and classifying anomalous behavior in ubiquitous kernel processes
Chaudhary et al. Plague of cross-site scripting on web applications: a review, taxonomy and challenges
Gupta et al. Evaluation and monitoring of XSS defensive solutions: a survey, open research issues and future directions
Hannousse et al. Twenty-two years since revealing cross-site scripting attacks: a systematic mapping and a comprehensive survey
Falana et al. Detection of cross-site scripting attacks using dynamic analysis and fuzzy inference system
Fredj Spheres: an efficient server-side web application protection system
Kaur et al. Defense against HTML5 XSS attack vectors: a nested context-aware sanitization technique
Sharif Web attacks analysis and mitigation techniques
Sundareswaran et al. XSS-Dec: A hybrid solution to mitigate cross-site scripting attacks
Patil Request dependency integrity: validating web requests using dependencies in the browser environment