Reference Hub40
Detection, Avoidance, and Attack Pattern Mechanisms in Modern Web Application Vulnerabilities: Present and Future Challenges

Detection, Avoidance, and Attack Pattern Mechanisms in Modern Web Application Vulnerabilities: Present and Future Challenges

Shashank Gupta, B. B. Gupta
Copyright: © 2017 |Volume: 7 |Issue: 3 |Pages: 43
ISSN: 2156-1834|EISSN: 2156-1826|EISBN13: 9781522515036|DOI: 10.4018/IJCAC.2017070101
Cite Article Cite Article

MLA

Gupta, Shashank, and B. B. Gupta. "Detection, Avoidance, and Attack Pattern Mechanisms in Modern Web Application Vulnerabilities: Present and Future Challenges." IJCAC vol.7, no.3 2017: pp.1-43. http://doi.org/10.4018/IJCAC.2017070101

APA

Gupta, S. & Gupta, B. B. (2017). Detection, Avoidance, and Attack Pattern Mechanisms in Modern Web Application Vulnerabilities: Present and Future Challenges. International Journal of Cloud Applications and Computing (IJCAC), 7(3), 1-43. http://doi.org/10.4018/IJCAC.2017070101

Chicago

Gupta, Shashank, and B. B. Gupta. "Detection, Avoidance, and Attack Pattern Mechanisms in Modern Web Application Vulnerabilities: Present and Future Challenges," International Journal of Cloud Applications and Computing (IJCAC) 7, no.3: 1-43. http://doi.org/10.4018/IJCAC.2017070101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

In this paper, we present comprehensive survey of secured web application by identifying numerous serious threats faced by several-related organizations. Based on this, we have summarized the statistics of all emerging web application vulnerabilities by referring several-linked vulnerabilities and their classifications like US-CERT, CVE, CWE, NVD, OWASP etc. In addition, we present a comprehensive survey of the emerging web application weaknesses and discuss how to avoid, detect and attack pattern mechanisms of all critical web threats. Moreover, a detailed comparison has also been presented for all emerging web application exposures corresponding to certain threat agents, which indicates the level of the threat for a recognized vulnerability. In addition, we discuss numerous precautions that can be taken while defining lifecycle of web applications with hacking tools and describe ways to launch & utilize safety procedures and regular security controls in a recursive manner.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.