Log visualization of intrusion and prevention reverse proxy server against web attacks
SQL Injection Attack (SQLIA) has made to the top of the OWASP, Top 10 Web Application Security Risks in 2013 and in 2010. The explosive use of web application with very little emphasis lay on securing it make this attack becoming more popular. Various methods have been discussed and propos...
Main Authors: | Mantoro, Teddy, Abdul Aziz, Normaziah, Meor Yusof, Nur Dalilah, Abu Talib, Nor Aishah |
---|---|
Format: | Proceeding Paper |
Language: | English |
Published: |
IEEE
2013
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/35416/1/06702833.pdf |
Similar Items
-
Exploring a 'plug and play' smart home system for mobile user
by: Mantoro, Teddy, et al.
Published: (2012) -
Implementation of server virualization to build energy efficient data centers
by: Uddin, Mueen, et al.
Published: (2014) -
Sharing of attacks information across clouds for improving security:a conceptual framework
by: Waqas, Ahmad, et al.
Published: (2014) -
Development of communication module for semi-autonomos UAV and robots
by: Abdul Aziz, Normaziah, et al.
Published: (2012) -
CRF based feature extraction applied for supervised automatic text summarization
by: K. Batcha, Nowshath, et al.
Published: (2013)