Defensive Against Web Application Attacks: Methods, Confronts and Consequences

Authors

  • Mohammed Bakhar Student, Department of Electronics and Communication Engineering, Guru Nanak Dev Engineering College Bidar, Karnataka, Andhra Pradesh, India

Keywords:

Web Applications, WSN, Cross-Site Scripting SQL

Abstract

All the above requirements are considered important when building mechanisms for the protection of applications. Based on this analysis, we identify the advantages and disadvantages of the various mechanisms and enumerate some of their common characteristics. We also draw useful conclusions about the various protection categories and see how they compare to each other. In addition, we attempt to shed light on the factors that may impede the adoption of defenses in practice. Finally, we provide some lessons and recommendations that developers of new defenses may find helpful.

How to cite this article:
Pooja, Bakhar M. Defensive Against Web
Application Attacks: Methods, Confronts and
Consequences. J Adv Res Netw Comm Engg 2020;
3(2): 9-13.

Published

2021-09-30