[go: up one dir, main page]

Shaikh, 2013 - Google Patents

Defending cross site reference forgery (CSRF) attacks on contemporary web applications using a Bayesian predictive model

Shaikh, 2013

View PDF
Document ID
1863867335942780709
Author
Shaikh R
Publication year
Publication venue
Available at SSRN 2226954

External Links

Snippet

This work presents specific solutions to defend a recent, not very well understood web vulnerability known as the Cross Site Reference Forgery (CSRF). A methodical approach is used to investigate CSRF attacks and propose remedies by introducing a novel and …
Continue reading at papers.ssrn.com (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service

Similar Documents

Publication Publication Date Title
US11323464B2 (en) Artifact modification and associated abuse detection
US11785037B2 (en) Cybersecurity risk assessment on an industry basis
US11736499B2 (en) Systems and methods for detecting injection exploits
US20210058395A1 (en) Protection against phishing of two-factor authentication credentials
US10142362B2 (en) Cloud based systems and methods for determining security risks of users and groups
Agarwal et al. A closer look at intrusion detection system for web applications
US8826400B2 (en) System for automated prevention of fraud
US8413239B2 (en) Web security via response injection
US10606991B2 (en) Distributed user-centric cyber security for online-services
CN112567707A (en) Enhanced techniques for generating and deploying dynamic false user accounts
US11729145B2 (en) User interface for web server risk awareness
Fung et al. Intrusion detection networks: a key to collaborative security
US12126638B2 (en) Systems and methods of adaptively identifying anomalous network communication traffic
Masood Cyber security for service oriented architectures in a Web 2.0 world: an overview of SOA vulnerabilities in financial services
US8763120B1 (en) Exploitation detection
Srinivasan et al. Understanding cross-channel abuse with sms-spam support infrastructure attribution
Qureshi et al. Analysis of challenges in modern network forensic framework
Shaikh Defending cross site reference forgery (CSRF) attacks on contemporary web applications using a Bayesian predictive model
Kothawade et al. Cloud Security: Penetration Testing of Application in Micro-service architecture and Vulnerability Assessment.
US12231458B2 (en) Cybersecurity risk assessment on an industry basis
Kox Cybersecurity in the perspective of Internet traffic growth
Moorthy et al. Intrusion detection in cloud computing implementation of (SAAS & IAAS) using grid environment
De et al. Security risk assessment in online social networking: A detailed survey
Shaikh Defending Cross-Site Request Forgery (CSRF) Attacks on Web Applications
ESCAP Enhancing cybersecurity for industry 4.0 in Asia and the Pacific