Constructing secure web applications with proper data validations
Title | Constructing secure web applications with proper data validations |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Kumar, A., Reddy, K. |
Conference Name | Recent Advances and Innovations in Engineering (ICRAIE), 2014 |
Date Published | May |
Keywords | Computational modeling, computer network security, critical web application vulnerabilities, Cross Site Scripting, data validations, HTML, injection, injections, Internet, secure Web applications, security, validation, Vulnerability, XML, XSS |
Abstract | With the advent of World Wide Web, information sharing through internet increased drastically. So web applications security is today's most significant battlefield between attackers and resources of web service. It is likely to remain so for the foreseeable future. By considering recent attacks it has been found that major attacks in Web Applications have been carried out even when system having most significant network level security. Poor input validation mechanisms that using in Web Applications shall causes to launching vulnerable web applications, which easy to exploit easy in future stages. Critical Web Application Vulnerabilities like Cross Site Scripting (XSS) and Injections (SQL, PHP, LDAP, SSL, XML, Command, and Code) are happen because of base level Validations, and it is enough to update system in unauthorized way or may be causes to exploit the system. In this paper we present those issues in data validations strategies, to avoid deployment of vulnerable web applications. |
DOI | 10.1109/ICRAIE.2014.6909304 |
Citation Key | 6909304 |