2019 15th International Conference on Electronics, Computer and Computation (ICECCO) 2019
DOI: 10.1109/icecco48375.2019.9043209
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Framework of Configuring and Evaluating ModSecurity WAF on Tomcat and Apache Web Servers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 9 publications
0
3
0
1
Order By: Relevance
“…Successful pollution attacks on P2P PHSs can be devastating because of the higher integrity and availability requirements of medical data than data shared in other P2P systems. The consequences of its exploitation could be between low and high, depending on the level of access gained; pollution attacks often serve as a gateway to identify vulnerabilities (eg, unverified inputs that can be used for SQL injection attacks [ 129 ]) and mount further attacks (eg, ransomware attacks). For example, in 2020, a patient in need of emergency care due to an aneurysm died in Germany during a ransomware attack in a hospital.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Successful pollution attacks on P2P PHSs can be devastating because of the higher integrity and availability requirements of medical data than data shared in other P2P systems. The consequences of its exploitation could be between low and high, depending on the level of access gained; pollution attacks often serve as a gateway to identify vulnerabilities (eg, unverified inputs that can be used for SQL injection attacks [ 129 ]) and mount further attacks (eg, ransomware attacks). For example, in 2020, a patient in need of emergency care due to an aneurysm died in Germany during a ransomware attack in a hospital.…”
Section: Resultsmentioning
confidence: 99%
“…In the case of P2P PHSs, the threat impact could be one user at a time, with the probability of escalating and affecting others in the network. Social engineering can be observed as an intelligent information gathering stage for attackers to mount other attacks [ 129 ], such as scamming patients to obtain, for instance, access credentials to their P2P PHS accounts. Depending on the attackers’ goals, they may modify patients’ health records or upload malware to the P2P network to affect patients’ lives, health, location, privacy, behaviors, or activities [ 93 ] and sabotage the PHS and its providers.…”
Section: Resultsmentioning
confidence: 99%
“…Existem alguns recursos para desvio de firewall e WAF (Web Application Firewall) [Yari et al 2019], tais como: alterar os cabec ¸alhos da requisic ¸ão por completo (ao invés de passar uma URL como alvo para a ferramenta, é passado um arquivo que contenha as suas informac ¸ões de requisic ¸ão), fazer a mutac ¸ão do payload, definir um delay entre cada requisic ¸ão, e usar proxies.…”
Section: Figura 1 Modo De Funcionamentounclassified
“…While the paper is not focused on cybersecurity, the following considerations could serve as a preliminary introduction. Detailed information on the power system configurations, electrified transportation systems, and applied smart grids technologies favour successful cyberattacks [53,56,57]. Therefore, the planning and operational data of most utilities are not publicly available.…”
Section: Introductionmentioning
confidence: 99%