International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 165 - Number 2 |
Year of Publication: 2017 |
Authors: Harshad Gaikwad, Bhavesh B. Shah, Priyanka Chatte |
10.5120/ijca2017913798 |
Harshad Gaikwad, Bhavesh B. Shah, Priyanka Chatte . SQLi and XSS Attack Introduction and Prevention Technique. International Journal of Computer Applications. 165, 2 ( May 2017), 23-27. DOI=10.5120/ijca2017913798
Nowadays, web applications are common around the world. every major company/organization have a web application presence. Max of these organizations use web applications to provide various services to clients. Some of these web applications employ database driven content. The back-end database often contains confidential and sensitive information such Password, credit card number, financial data, medical data, email details. Typically the web user/client supplies information, such as a username and password and web server receive user request and interact with the back-end database and returned relevant data to the Front-end. Web Applications penetration testing and security has become progressively most important these days. A lot numbers of malicious attacks are being deployed on the web application. Due to dramatic increase in Web applications usage, Web application get vulnerable to variety of threats. Most of these malicious attacks are targeted towards the web application layer and waf firewall alone cannot prevent these kinds of attacks. The reason behind success of these attacks is the ignorance of application developers while coding the web applications and the predefined vulnerabilities in the existing technologies. Web application attacks are the latest trend and hackers are trying to hack/exploit the web application using different techniques. Various types of solutions are available as open source and in market. But the selection of suitable solution for the security of the organizational systems is a major issue. Some Attack Prevention Technique protect web applications from attacks they sit in front of web applications monitors activity, and block malicious traffic.