15Recent Techniques for Exploitation and Protection of Common Malicious Inputs to Online Applications

Dr. Tun Myat Aung1* and Ni Ni Hla2

1Faculty of Computer System and Technology, University of Computer Studies, Yangon (UCSY), Yangon, Myanmar

2Faculty of Computing, University of Computer Studies, Yangon (UCSY), Yangon, Myanmar

*Corresponding author: tunmyataung@ucsy.edu.mm

Abstract

A developer must have an understanding ability of secure coding to create secure applications. A secure coding knowledge is focused on the combination of multiple mechanisms for exploiting and protecting typical malicious inputs to vulnerabilities of an application. The aim of this chapter is to review the recent techniques about exploitation and protection of common malicious inputs to online applications implemented by PHP script for a developer to enhance the security of web pages. This chapter provides essential knowledge and mechanisms to vulnerabilities management for secure online applications.

Keywords: Exploitation, protection, web vulnerabilities, malicious inputs, secure coding, recent techniques, secure web applications

15.1 Introduction

Online applications (apps) are one of today’s most popular platforms for the distribution of information and services over the Internet. The development of Internet makes online apps so popular and they are utilized for a variety of applications based on online services. The greater online services become, the more online apps are developed. Online ...

Get Cyber Security and Digital Forensics now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.