A Study on Different Scanners and Their Limitations for Web Application Vulnerabilities
Journal: International Journal of Engineering and Techniques (Vol.3, No. 6)Publication Date: 2017-12-01
Authors : M. Sridevi K.V.N.Sunitha;
Page : 543-547
Keywords : Web Application Security; Web Application Vulnerabilities; Denial of Service; SQL Injection; Cross Site Scripting; Cross Site Request Forgery; Web Security Scanners;
Abstract
Web applications have become commodiously popular in the last two decades and have touched every walk of our daily lives. At the same time they have accrued large volumes of sensitive data. This has allured the attackers, who ever since been looking out for the vulnerabilities in the applications constantly. In this paper, the most common web attacks are deliberated. The artifice of how these attacks are effectuated is discussed. Some of the most common industries targeted by the attackers are Finance, Government, Healthcare and IT. The recent trends in the web attacks and their consequences on the organizations are analyzed. The common scanners or automated tools to scan for vulnerabilities and their limitations are deciphered.
Other Latest Articles
- Nanomedicine: Where we stand and where can we go?
- Features of phase-refined materials
- KEY MODULATION REVERSIBLE IMAGE DATA HIDING OVER ENCRYPTED DOMAIN FOR SECURE IN FEATURE EXTRACTION
- A REVIEW OF NAGUIB MAHFOUZ’S ‘THE BEGGAR’ BASED ON NORMAN FAIRCLOUGH'S CRITICAL DISCOURSE ANALYSIS
- Micro-Modulations of Titanium Oxide Coatings Formed Using a Femtosecond Laser
Last modified: 2018-05-21 19:22:37