The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Tools utilizing the web-server's logs for monitoring and analyzing the users' behavior are used in many fields where the Internet plays a major role as in e-commerce and e-learning. These tools are very useful for tracking the learning activities of the students in web-based Course Management Systems (CMS). While the logs can be customized to include much information on what goes-on in the CMS, they...
Web applications are a fundamental pillar of today's globalized world. Society depends and relies on them for business and daily life. However, web applications are under constant attack by hackers that exploit their vulnerabilities to access valuable assets and disrupt business. Many studies and reports on web application security problems analyze the victim's perspective by detailing the vulnerabilities...
The web is a crucial source of information nowadays. At the same time, web applications become more and more complex. Therefore, a spontaneous increase in the number of visitors, e.g., based on news reports or events, easily brings a web server in an overload situation. In contrast to the classical model of distributed denial of service (DDoS) attacks, such a so-called flash effect situation is not...
With the rapid development of Internet, more and more web applications based on database appeared, thus the databases face the threats. Because of the SQL attacks, people pay much attention to the security of database on the internet. This paper presents a solution that is a database security gateway deployed between web server and database server. The paper describes the architecture of the database...
Although Tor is the most widely used overlay for providing anonymity services, its users often experience very high delays. Because much of Tor usage is for Web applications, which are sensitive to latency, it is critical to reduce delays in Tor. To take an important step in this direction, we seek an in-depth understanding of delays in Tor. By taking snapshots of the entire Tor network within a short...
Finding effective approaches to detect vulnerabilities is important to guarantee the security of Web applications. Web application security issues are mostly related to malicious input data and Web forms are the main interface to input these data. According to the above observation, we propose a novel approach to detect Web application vulnerabilities. In our approach, given a URL, we get a target...
WebGIS is the inevitable trend of GIS with the development of network technology. Unlike normal Web applications, WebGIS has the characteristics of calculation of mass data and long processing time. Therefore, the popular Web development technologies may not be suitable to develop WebGIS. In order to adapt the characteristics of WebGIS, this article compares and analyzes merits and faults among the...
The Green Ajax outperforms than the classical Ajax. It can decrease the bandwidth consumption to/from the web server. In the previous research, the Green Ajax results the best performance for the case of random and unpredictable update time on the web server. However, from practical point of view the web server will not always update at the random pattern of time. In this research, the web server...
The classic web applications usually need a lot of bandwidth to provide the rich user interfaces. Since Ajax [8] was introduced, it has reduced the web server load and the data transfer to/from users' computers. By using Ajax, only a specific part in the web page can be requested to the web server [6]. However, it still cannot provide the real time data updating. The common approach to provide the...
Although a number of techniques exist for authentication, web sites and web applications continue to use weak authentication schemes that are vulnerable for attack, particularly in e-commerce environments. These challenges are often occurred because of careless use of authenticators stored on the client-side. In this paper, we have developed a web client authentication system using smart card, called...
The performance testing criteria was analyzed, including response time, concurrency users, throughout and performance counter. Performance testing is necessary for the system reliability. Load testing can be used for software troubleshooting and optimizing. With the LoadRunner and TestDirector testing tools, a load testing scheme based on an online examination system was designed.
With the rapid development of Internet, the scale of WEB service is expanding. WEB cluster technology is required to support the large-scale WEB applications. WEB load management is a critical technology of WEB clusters. In this paper, a load management mechanism is presented and a system based on it is implemented. To implement the system, share memory technology and synchronization hash technology...
In this paper, we show that Web protocols and technologies are good candidates to design the Internet of things. This approach allows anyone to access embedded devices through a Web application, via a standard Web browser. This Web of things requires to embed Web servers in hardware-constrained devices. We first analyze the traffics embedded Web servers have to handle. Starting from this analysis,...
The use of diversity and redundancy in the security domain is an interesting approach to prevent or detect intrusions. Many researchers have proposed architectures based on those concepts where diversity is either natural or artificial. These architectures are based on the architecture of N-version programming and were often instantiated for web servers without taking into account the web application(s)...
The Erlang programming language, together with its Open Telecom Platform (OTP) framework, is renowned for its exceptional concurrency and fault-tolerance capabilities. Developers are often initially attracted to Erlang just so they can try out these features, and experienced Erlang server application developers make heavy use of these and other Erlang traits. Successful Erlang server applications...
This demonstration shows a Web application offering multimedia contents, whose access is fully controlled by a smart card according to an innovative context, named TLS-Tandem. Credentials required by the Web site, and used by the smart card (certificates, private keys), are distributed via AJAX facilities.
With an increasing number of personalized information and services offered on the Internet, especially the World Wide Web, effective identity management solutions are demanded by application providers. Instead of a Web-based stand-alone approach, we extend existing network-based AAA mechanisms to be useable for identity management by Web applications. Our proposal, Diameter WebAuth, allows to seamlessly...
It has been discovered in recent years that the Internet attacks started by improper authorization on Web servers and Web applications. The top 10 Web vulnerabilities issued by OWASP and the top 20 security risks issued by SANS demonstrated that Web attacks is one of the most important network security problems. Therefore, with the help from Web attack taxonomy, we can classify the attack type with...
There has been considerable increase in application layer attacks. Research surveys show that the cross site scripting (XSS) attack is most common among all the application layer attacks. Ajax Web technology, by design makes number of calls to the Web server to process a user request. This increases the bandwidth usage and response time due increase in the number of calls to the Web server. If security...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.