Assessment of the web application security effectiveness against various methods of network attacks
Article Sidebar
Open full text
Published:
Dec 30, 2018
Issue Vol. 9 (2018)
Articles
-
Security assessment of the selected mobile platform
Aleksandra Iwaniuk302-307
-
Author's method of securing the screen of the mobile device.
Grzegorz Iwaniuk308-310
-
Method of increasing the QR code capacity – Hexa QR Code
Daniel Janowski311-317
-
Comparative analysis of approches in developing Android applications using Xamarin technology
Michał Bartkiewicz, Adrian Dziedzic318-323
-
Quality evaluation of selected tools to automate application testing
Łukasz Szczepkowicz, Beata Pańczyk324-327
-
Comparative analysis of Front-End Code Playground tools
Mateusz Magier, Beata Pańczyk328-333
-
Comparison of selected tools to perform unit tests
Piotr Strzelecki, Maria Skublewska-Paszkowska334-339
-
Assessment of the web application security effectiveness against various methods of network attacks
Mateusz Erbel, Piotr Kopniak340-344
-
Method of synchronization and data processing from differents inertial sensors kits sources for the human gait analysis
Aleksandra Goźdź, Maciej Kalinowski, Piotr Kopniak345-349
-
Testing the functionality of the application made in .NET Core technology on the Raspberry Pi II platform
Tomasz Piotr Sajnóg, Dariusz Czerwiński350-358
Main Article Content
DOI
Authors
Mateusz Erbel
Institute of Computer Science, Lublin University of Technology, Nadbystrzycka 36B, 20-618 Lublin, Poland, Poland
Piotr Kopniak
Institute of Computer Science, Lublin University of Technology, Nadbystrzycka 36B, 20-618 Lublin, Poland, Poland
Abstract
The article discusses the issue of the security of Internet applications. The most popular types of attacks and methods of securing web applications against them are discussed. The study conducted the effectiveness of security of web applications. The research methodology was based on the proprietary application implemented in PHP technology. The result of the research is a proposal of solutions aimed at improving application security.
Keywords:
Network attacks; Internet applications; XSS; SQL Injection
References
[1] Zagrożenia aplikacji internetowych http://tadek.pietraszek.org/publications/kasprowski03_zagrozenia.pdf, luty 2018.
[2] Ziaja A.: Practical break-in analysis, PWN, 2017.
[3] Thomas, najbardziej uciążliwy cyberprzestępca https://zaufanatrzeciastrona.pl/post/thomas-najbardziejuciazliwy-polski-cyberprzestepca-zatrzymany-przez-policje/,marzec 2018.
[4] Mueller J.: Security for Web Developers. O’Reilly Media, 2015.
[5] Hope P, Walther B.: Web Security Testing Cookbook, O’Reilly Media, 2012.
[6] Agarwal M, Singh A.: Metasploit. Receptury pentestera. Helion 2014.
[7] Ataak CSRF, https://haker.edu.pl/2016/04/23/atak-csrf-xsrfi hasla-wep-9/, czerwiec 2018.
[8] Prasad P.: Testy penetracyjne nowoczesnych serwisów. Helion 2017.
[9] W3Techs – extensive and reliable web technology surveys, https://w3techs.com/, marzec 2018.
[2] Ziaja A.: Practical break-in analysis, PWN, 2017.
[3] Thomas, najbardziej uciążliwy cyberprzestępca https://zaufanatrzeciastrona.pl/post/thomas-najbardziejuciazliwy-polski-cyberprzestepca-zatrzymany-przez-policje/,marzec 2018.
[4] Mueller J.: Security for Web Developers. O’Reilly Media, 2015.
[5] Hope P, Walther B.: Web Security Testing Cookbook, O’Reilly Media, 2012.
[6] Agarwal M, Singh A.: Metasploit. Receptury pentestera. Helion 2014.
[7] Ataak CSRF, https://haker.edu.pl/2016/04/23/atak-csrf-xsrfi hasla-wep-9/, czerwiec 2018.
[8] Prasad P.: Testy penetracyjne nowoczesnych serwisów. Helion 2017.
[9] W3Techs – extensive and reliable web technology surveys, https://w3techs.com/, marzec 2018.
Article Details
Erbel, M., & Kopniak, P. (2018). Assessment of the web application security effectiveness against various methods of network attacks . Journal of Computer Sciences Institute, 9, 340–344. https://doi.org/10.35784/jcsi.707
Abstract views: 338
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
