Defensive Against Web Application Attacks: Methods, Confronts and Consequences

  • Mohammed Bakhar Student, Department of Electronics and Communication Engineering, Guru Nanak Dev Engineering College Bidar, Karnataka, Andhra Pradesh, India

Abstract

All the above requirements are considered important when building mechanisms for the protection of applications. Based on this analysis, we identify the advantages and disadvantages of the various mechanisms and enumerate some of their common characteristics. We also draw useful conclusions about the various protection categories and see how they compare to each other. In addition, we attempt to shed light on the factors that may impede the adoption of defenses in practice. Finally, we provide some lessons and recommendations that developers of new defenses may find helpful.


How to cite this article:
Pooja, Bakhar M. Defensive Against Web
Application Attacks: Methods, Confronts and
Consequences. J Adv Res Netw Comm Engg 2020;
3(2): 9-13.

Published
2021-09-30
How to Cite
BAKHAR, Mohammed. Defensive Against Web Application Attacks: Methods, Confronts and Consequences. Journal of Advanced Research in Networking and Communication Engineering, [S.l.], v. 3, n. 2, p. 9-13, sep. 2021. Available at: <http://thejournalshouse.com/index.php/adr-networking-communication-eng/article/view/388>. Date accessed: 03 apr. 2025.