December 2024
·
3 Reads
This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.
December 2024
·
3 Reads
December 2024
·
29 Reads
This study analyze web attack models using variety of vulnerability tools. It also analyze some of the known cyber attacks like Cross-Site Scripting, SQL Injection which are in fact the major threats of web application. The proposed method implements the Enhanced XSS Guard to identify XSS attacks and Aho-Cora sick Pattern to identify SQLi attacks. This study also compares various types of threat modeling techniques like the STRIDE model, Attack Tree model, Kill Chain model to understand and prevent these attacks. Tools such as SDL developed by Microsoft, Trike, and Sea Monster have been used to simulate and analyze these threats that increase the security factors related to web applications.