Security Investigate

Handling Web and Database Requests Using Fuzzy Rules for Anomaly Intrusion Detection

Download now Free registration required

Executive Summary

The Web applications provide easy access to the relevant and necessary information through web pages to the users. In many cases, web applications include client-side components such as JavaScript code that interact with server-side components. The server-side components often access the application's data stored in a back-end database. On the other hand, the application specific code is often developed under strict time constraints by programmers with little experience and security training. As a result, vulnerable web-based applications are often exposed to the entire Internet, creating easily-exploitable entry points for the compromise of entire networks.

  • Format: PDF
  • Size: 144.73 KB