Shaikh, 2013 - Google Patents
Defending cross site reference forgery (CSRF) attacks on contemporary web applications using a Bayesian predictive modelShaikh, 2013
View PDF- Document ID
- 1863867335942780709
- Author
- Shaikh R
- Publication year
- Publication venue
- Available at SSRN 2226954
External Links
Snippet
This work presents specific solutions to defend a recent, not very well understood web vulnerability known as the Cross Site Reference Forgery (CSRF). A methodical approach is used to investigate CSRF attacks and propose remedies by introducing a novel and …
- 235000014510 cooky 0 description 3
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11323464B2 (en) | Artifact modification and associated abuse detection | |
US11785037B2 (en) | Cybersecurity risk assessment on an industry basis | |
US11736499B2 (en) | Systems and methods for detecting injection exploits | |
US20210058395A1 (en) | Protection against phishing of two-factor authentication credentials | |
US10142362B2 (en) | Cloud based systems and methods for determining security risks of users and groups | |
Agarwal et al. | A closer look at intrusion detection system for web applications | |
US8826400B2 (en) | System for automated prevention of fraud | |
US8413239B2 (en) | Web security via response injection | |
US10606991B2 (en) | Distributed user-centric cyber security for online-services | |
CN112567707A (en) | Enhanced techniques for generating and deploying dynamic false user accounts | |
US11729145B2 (en) | User interface for web server risk awareness | |
Fung et al. | Intrusion detection networks: a key to collaborative security | |
US12126638B2 (en) | Systems and methods of adaptively identifying anomalous network communication traffic | |
Masood | Cyber security for service oriented architectures in a Web 2.0 world: an overview of SOA vulnerabilities in financial services | |
US8763120B1 (en) | Exploitation detection | |
Srinivasan et al. | Understanding cross-channel abuse with sms-spam support infrastructure attribution | |
Qureshi et al. | Analysis of challenges in modern network forensic framework | |
Shaikh | Defending cross site reference forgery (CSRF) attacks on contemporary web applications using a Bayesian predictive model | |
Kothawade et al. | Cloud Security: Penetration Testing of Application in Micro-service architecture and Vulnerability Assessment. | |
US12231458B2 (en) | Cybersecurity risk assessment on an industry basis | |
Kox | Cybersecurity in the perspective of Internet traffic growth | |
Moorthy et al. | Intrusion detection in cloud computing implementation of (SAAS & IAAS) using grid environment | |
De et al. | Security risk assessment in online social networking: A detailed survey | |
Shaikh | Defending Cross-Site Request Forgery (CSRF) Attacks on Web Applications | |
ESCAP | Enhancing cybersecurity for industry 4.0 in Asia and the Pacific |