2021
DOI: 10.1155/2021/5523806
|View full text |Cite
|
Sign up to set email alerts
|

Poor Coding Leads to DoS Attack and Security Issues in Web Applications for Sensors

Abstract: As the SQL injection attack is still at the top of the list at Open Web Application Security Project (OWASP) for more than one decade, this type of attack created too many types of issues for a web application, sensors, or any similar type of applications, such as leakage of user private data and organization intellectual property, or may cause Distributed Denial of Service (DDoS) attacks. This paper focused on the poor coding or invalidated input field which is a big cause of services unavailability for web a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 15 publications
(15 reference statements)
0
6
0
Order By: Relevance
“…Users' credentials, such as usernames and passwords, can be taken by using SQL injection. This can then be used to access user accounts without authorization [112], [113].…”
Section: ) Sql Injectionmentioning
confidence: 99%
“…Users' credentials, such as usernames and passwords, can be taken by using SQL injection. This can then be used to access user accounts without authorization [112], [113].…”
Section: ) Sql Injectionmentioning
confidence: 99%
“…According to [102], ineffective coding and the selection of ineffective programming software solutions significantly contribute to the unavailability of web application services as attackers exploit the vulnerability of input fields. This condition is accomplished by either putting the SQL query command into the input or appending the query with the desired uniform resource locator (URL).…”
Section: Smartphone User Activities Based On Software Modalitymentioning
confidence: 99%
“…This condition is accomplished by either putting the SQL query command into the input or appending the query with the desired uniform resource locator (URL). These SQL queries are converted to SQL code that an attacker inserts [102,103]. This vulnerability injection is the primary vector through which an attacker can compromise a web application's security.…”
Section: Smartphone User Activities Based On Software Modalitymentioning
confidence: 99%
“…(iv) In paper [3] [10] algorithm selection service (ADS) with genetic algorithm (GA) and tsfresh tool. For IoT stream data, it requires that the anomaly detection algorithm can provide good recommendation for easy operation for IoT devices in factory automation systems.…”
Section: Papers In Is Specialmentioning
confidence: 99%