Handling Web and Database Requests Using Fuzzy Rules for Anomaly Intrusion Detection

The Web applications provide easy access to the relevant and necessary information through web pages to the users. In many cases, web applications include client-side components such as JavaScript code that interact with server-side components. The server-side components often access the application's data stored in a back-end database. On the other hand, the application specific code is often developed under strict time constraints by programmers with little experience and security training. As a result, vulnerable web-based applications are often exposed to the entire Internet, creating easily-exploitable entry points for the compromise of entire networks.

Provided by: Science Publications Topic: Security Date Added: Feb 2011 Format: PDF

Find By Topic