{"title":"Code Injection Assault & Mitigation Model to Prevent Attacks","authors":"Shalom Akhai, Vincent Balu","doi":"10.1109/SMART55829.2022.10046835","DOIUrl":null,"url":null,"abstract":"The majority of businesses now want to conduct their operations online, and web applications are one of the most popular targets for web application assaults, which are quickly emerging as the biggest security risk facing modern businesses. Denial of services (DOS), malware, and brute force assaults, for instance, are the most frequent cyberattacks on web applications nowadays. Basically, Exploit is a flaw on the web that enables attackers to manipulate the queries that a website relies on. An attacker may actually read, remove, add, and retrieve the stored data with the use of these queries.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SMART55829.2022.10046835","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The majority of businesses now want to conduct their operations online, and web applications are one of the most popular targets for web application assaults, which are quickly emerging as the biggest security risk facing modern businesses. Denial of services (DOS), malware, and brute force assaults, for instance, are the most frequent cyberattacks on web applications nowadays. Basically, Exploit is a flaw on the web that enables attackers to manipulate the queries that a website relies on. An attacker may actually read, remove, add, and retrieve the stored data with the use of these queries.