tag:blogger.com,1999:blog-76197674194394849602024-02-20T12:44:13.724-08:00Web Application Security Threats And Defense Using Open Source ToolsDevang Sharmahttp://www.blogger.com/profile/04998724770283500588noreply@blogger.comBlogger1125tag:blogger.com,1999:blog-7619767419439484960.post-55187467597441514502013-11-21T05:30:00.001-08:002013-11-21T11:56:07.616-08:00<div dir="ltr" style="text-align: left;" trbidi="on">
<span style="background-color: white; font-family: arial; font-size: 14px; line-height: 21.328125px;">Hello friends, </span><br />
<br style="background-color: white; font-family: arial; font-size: 14px; line-height: 1.5em;" />
<span style="background-color: white; font-family: arial; font-size: 14px; line-height: 21.328125px;">I did my research work on "Web Application Security Threats and Defense Using Open Source Tools". I also published a paper in the IJCA journal related to this topic titled "Programmer Protocol for Identification and Defense of Latest Web Application Security Threats Using Open Source Tools" which can be found on the link: </span><a href="http://research.ijcaonline.org/volume76/number13/pxc3890843.pdf" rel="nofollow" style="background-color: white; color: #0a5ca3; font-family: arial; font-size: 14px; line-height: 1.5em; text-decoration: none;"></a><span style="background-color: white; font-family: arial; font-size: 14px; line-height: 21.328125px;"></span><br />
<br style="background-color: white; font-family: arial; font-size: 14px; line-height: 1.5em;" />
<a href="http://research.ijcaonline.org/volume76/number13/pxc3890843.pdf" target="_blank">http://research.ijcaonline.org/volume76/number13/pxc3890843.pdf</a><br />
<br />
<span style="background-color: white; font-family: arial; font-size: 14px; line-height: 21.328125px;">The abstract of the paper is: </span><br />
<br style="background-color: white; font-family: arial; font-size: 14px; line-height: 1.5em;" />
<span style="background-color: white; font-family: arial; font-size: 14px; line-height: 21.328125px;">There has been an exponential increase in the number of </span><br />
<span style="background-color: white; font-family: arial; font-size: 14px; line-height: 21.328125px;">attacks on web applications during the recent years. This </span><br />
<span style="background-color: white; font-family: arial; font-size: 14px; line-height: 21.328125px;">paper presents a guideline for programmers to develop robust </span><br />
<span style="background-color: white; font-family: arial; font-size: 14px; line-height: 21.328125px;">web applications in terms of security by identification of latest </span><br />
<span style="background-color: white; font-family: arial; font-size: 14px; line-height: 21.328125px;">web application security vulnerabilities and devising their </span><br />
<span style="background-color: white; font-family: arial; font-size: 14px; line-height: 21.328125px;">control using open source dynamic and static web application </span><br />
<span style="background-color: white; font-family: arial; font-size: 14px; line-height: 21.328125px;">security assessment tools. A highly vulnerable web </span><br />
<span style="background-color: white; font-family: arial; font-size: 14px; line-height: 21.328125px;">application is taken as a sample and it is projected to dynamic </span><br />
<span style="background-color: white; font-family: arial; font-size: 14px; line-height: 21.328125px;">tools which lookup for security loopholes in it according to its </span><br />
<span style="background-color: white; font-family: arial; font-size: 14px; line-height: 21.328125px;">behavior in the actual working environment and static tools </span><br />
<span style="background-color: white; font-family: arial; font-size: 14px; line-height: 21.328125px;">lookup for security loopholes in the programming logics by </span><br />
<span style="background-color: white; font-family: arial; font-size: 14px; line-height: 21.328125px;">static analysis of the actual source code. Finally, the concept </span><br />
<span style="background-color: white; font-family: arial; font-size: 14px; line-height: 21.328125px;">of a static analysis monitoring tool is given which can serve a </span><br />
<span style="background-color: white; font-family: arial; font-size: 14px; line-height: 21.328125px;">fool proof solution for one of the most encountered attack </span><br />
<span style="background-color: white; font-family: arial; font-size: 14px; line-height: 21.328125px;">namely, Cross Site Scripting (XSS).</span></div>
Devang Sharmahttp://www.blogger.com/profile/04998724770283500588noreply@blogger.com3