Log visualization of intrusion and prevention reverse proxy server against web attacks
SQL Injection Attack (SQLIA) has made to the top of the OWASP, Top 10 Web Application Security Risks in 2013 and in 2010. The explosive use of web application with very little emphasis lay on securing it make this attack becoming more popular. Various methods have been discussed and propos...
Main Authors: | Mantoro, Teddy, Abdul Aziz, Normaziah, Meor Yusof, Nur Dalilah, Abu Talib, Nor Aishah |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
IEEE
2013
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/35416/ http://irep.iium.edu.my/35416/ http://irep.iium.edu.my/35416/1/06702833.pdf |
Similar Items
-
Log your car: The non-invasive vehicle forensics
by: Mansor, Hafizah, et al.
Published: (2016) -
Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015) -
State of the art intrusion detection system for cloud computing
by: Ahmad, Azuan, et al.
Published: (2018) -
Implementation of server virualization to build energy efficient data centers
by: Uddin, Mueen, et al.
Published: (2014) -
Modelling of intelligent intrusion detection system: making a case for snort
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)