问题描述:
英语翻译
A web application is application software which includes dynamic web pages such that end users can access the software through client modules that run in web browsers.The coding of client modules is in browser supported languages such as HTML,Java,ASP,PHP etc.In three tire web applications,the user provides query specification as input in a pre defined format in the front tire.These inputs are used in constructing SQL queries by the application server in the middle tire.The back tire contains the database server.Web applications are popular due to the ubiquity of web browsers,and the convenience of using a web browser as a client,sometimes called as thin client.The ability to update and maintain web applications without distributing and installing software on potentially thousands of client computers is a key reason for their popularity.Common web applications include web mail,on line retail sales,on line auctions,on line banking,and many other functional applications.Mitres Vulnerability statistics reported in the year 2010 2011[2],points out 25 most common program errors or vulnerabilities causing most successful SQL injection attack along with other web application attacks.These vulnerabilities are dangerous because it gives chances * The department is funded by UGCs DRS I under the SAP to the attackers to steal data from the application database.It is claimed that the SQL Injection scored highest rank among the web application attacks.It is reported that SQL Injections are one of the most common and easiest techniques adopted by attackers to attack web servers,data servers and sometimes the network.This category of web attack is conducted for unauthorized access of web application,breaking the role based accessibility,and violating the integrity of the data storage.A significant rise in SQL injection attack is reported by CISCO[3] too.The Information Systems Audit Cell report[4] recommends review the application control in net banking applications by conducting penetration testing keeping in view of the prevailing guidelines by Reserve Bank of India,IT Act and other applicable regulations in India and asked to check the vulnerabilities in the applications like SQL injection,Cross site scripting etc.In this paper,in section 2,we report the background of SQL injection attack and its different classes.In this section we also present its existing practice of detection.We finally discuss in this section 2,the brief idea of the approach called DUD.In section 3,the propose detection approach RDUD is described.We report our problem formulation along with the detection algorithms in section 4.Experimental results and finally the concluding remarks are reported in section 5 and 6 respectively.
A web application is application software which includes dynamic web pages such that end users can access the software through client modules that run in web browsers.The coding of client modules is in browser supported languages such as HTML,Java,ASP,PHP etc.In three tire web applications,the user provides query specification as input in a pre defined format in the front tire.These inputs are used in constructing SQL queries by the application server in the middle tire.The back tire contains the database server.Web applications are popular due to the ubiquity of web browsers,and the convenience of using a web browser as a client,sometimes called as thin client.The ability to update and maintain web applications without distributing and installing software on potentially thousands of client computers is a key reason for their popularity.Common web applications include web mail,on line retail sales,on line auctions,on line banking,and many other functional applications.Mitres Vulnerability statistics reported in the year 2010 2011[2],points out 25 most common program errors or vulnerabilities causing most successful SQL injection attack along with other web application attacks.These vulnerabilities are dangerous because it gives chances * The department is funded by UGCs DRS I under the SAP to the attackers to steal data from the application database.It is claimed that the SQL Injection scored highest rank among the web application attacks.It is reported that SQL Injections are one of the most common and easiest techniques adopted by attackers to attack web servers,data servers and sometimes the network.This category of web attack is conducted for unauthorized access of web application,breaking the role based accessibility,and violating the integrity of the data storage.A significant rise in SQL injection attack is reported by CISCO[3] too.The Information Systems Audit Cell report[4] recommends review the application control in net banking applications by conducting penetration testing keeping in view of the prevailing guidelines by Reserve Bank of India,IT Act and other applicable regulations in India and asked to check the vulnerabilities in the applications like SQL injection,Cross site scripting etc.In this paper,in section 2,we report the background of SQL injection attack and its different classes.In this section we also present its existing practice of detection.We finally discuss in this section 2,the brief idea of the approach called DUD.In section 3,the propose detection approach RDUD is described.We report our problem formulation along with the detection algorithms in section 4.Experimental results and finally the concluding remarks are reported in section 5 and 6 respectively.
问题解答:
我来补答展开全文阅读