Security of Web Applications
Article Sidebar
Open full text
Published:
Mar 30, 2017
Issue Vol. 3 (2017)
Articles
-
Security of Web Applications
Michał Furtak1-5
-
Using of Node.js in creating application based on event-driven architecture
Władysław Hrynczyszyn, Małgorzata Plechawska-Wójcik6-10
-
Analysis of the effectiveness of text input methods using the mobile network communicator
Rafał Kacprzak, Piotr Kaniewski, Maria Skublewska-Paszkowska11-17
-
Analysis and evaluation of impact virtual reality on human state
Szymon Kołażyk, Konrad Maciąg, Dariusz Gutek18-22
-
Simulation of BOID type behaviours in Unity environment
Taras Lypovyi, Jerzy Montusiewicz23-27
-
Comparison of JEE platform web applications development using JavaServer Faces and Spring Boot example
Michał Marcin Kizeweter, Beata Pańczyk28-32
-
Increasing an efficiency of the web-applications developing the process through the combine of frameworks MeteorJS and AngularJS
Viacheslav Nishtuk, Elżbieta Miłosz33-37
-
The methods of EMG data processing
Michał Serej, Maria Skublewska - Paszkowska38-45
-
Methods for optimizing the performance of Unity 3D game engine based on third-person perspective game
Krzysztof Siarkowski, Przemysław Sprawka, Małgorzata Plechawska-Wójcik46-53
-
Comparison of mobile application using Swift and Objective-C
Kacper Erwin Sienkiewicz, Edyta Łukasik54-58
-
Efficiency analysis of Unity3D engine in terms of particle simulation
Mateusz Walczyna, Małgorzata Plechawska-Wójcik59-63
-
Comparative analysis of e-Learning tools
Weronika Prządka64-69
Main Article Content
DOI
Authors
Michał Furtak
Lublin University of Technology, Poland
Abstract
This article is about web application security. Describes the most common types of web attacks. The analysis was subjected to authoring application Internetowy Notatnik. Provides solutions to improve safety.
Keywords:
web attack; sql injection, xss
References
[1] R. Cohen-Almagor, Internet History, International Journal of Technoethics, 2011
[2] Netcraft, Web Server Survey, 2014
[3] R. Krzyżaniak, Web 2.0 w Polsce, 2007
[4] J. Mirković i inni, Attacking DDoS at the Source, 2002
[5] https://www.owasp.org/ [20.11.2016]
[6] http://projects.webappsec.org/ [20.11.2016]
[7] S. Jeongseok, Web server attack categorization based on root causes and their locations, 2004
[8] K. Navdeep, Modeling a SQL injection attack, 2015
[9] M. Qbea'h, Detecting and Preventing SQL Injection Attacks: A Formal Approach, 2016
[10] http://www.jtmelton.com/2010/09/21/preventing-log-forgingin-java/ [20.11.2016]
[11] M. K. Gupta i inni, Predicting Cross-Site Scripting (XSS) security vulnerabilities in web applications, 2015
[12] A. Singh i inni, A Survey on XSS web-attack and Defense Mechanisms, 2014
[13] L. Franceschi-Bicchierai, The MySpace Worm that Changed the Internet Forever, 2015
[14] http://php.net/manual/en/function.password-hash.php [20.11.2016]
[2] Netcraft, Web Server Survey, 2014
[3] R. Krzyżaniak, Web 2.0 w Polsce, 2007
[4] J. Mirković i inni, Attacking DDoS at the Source, 2002
[5] https://www.owasp.org/ [20.11.2016]
[6] http://projects.webappsec.org/ [20.11.2016]
[7] S. Jeongseok, Web server attack categorization based on root causes and their locations, 2004
[8] K. Navdeep, Modeling a SQL injection attack, 2015
[9] M. Qbea'h, Detecting and Preventing SQL Injection Attacks: A Formal Approach, 2016
[10] http://www.jtmelton.com/2010/09/21/preventing-log-forgingin-java/ [20.11.2016]
[11] M. K. Gupta i inni, Predicting Cross-Site Scripting (XSS) security vulnerabilities in web applications, 2015
[12] A. Singh i inni, A Survey on XSS web-attack and Defense Mechanisms, 2014
[13] L. Franceschi-Bicchierai, The MySpace Worm that Changed the Internet Forever, 2015
[14] http://php.net/manual/en/function.password-hash.php [20.11.2016]
Article Details
Abstract views: 267
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
