Handling Web and Database Requests Using Fuzzy Rules for Anomaly Intrusion Detection

Date Added: Feb 2011
Format: PDF

The Web applications provide easy access to the relevant and necessary information through web pages to the users. In many cases, web applications include client-side components such as JavaScript code that interact with server-side components. The server-side components often access the application's data stored in a back-end database. On the other hand, the application specific code is often developed under strict time constraints by programmers with little experience and security training. As a result, vulnerable web-based applications are often exposed to the entire Internet, creating easily-exploitable entry points for the compromise of entire networks.