115,285 research outputs found
Reverse Proxy Framework using Sanitization Technique for Intrusion Prevention in Database
With the increasing importance of the internet in our day to day life, data
security in web application has become very crucial. Ever increasing on line
and real time transaction services have led to manifold rise in the problems
associated with the database security. Attacker uses illegal and unauthorized
approaches to hijack the confidential information like username, password and
other vital details. Hence the real time transaction requires security against
web based attacks. SQL injection and cross site scripting attack are the most
common application layer attack. The SQL injection attacker pass SQL statement
through a web applications input fields, URL or hidden parameters and get
access to the database or update it. The attacker take a benefit from user
provided data in such a way that the users input is handled as a SQL code.
Using this vulnerability an attacker can execute SQL commands directly on the
database. SQL injection attacks are most serious threats which take users input
and integrate it into SQL query. Reverse Proxy is a technique which is used to
sanitize the users inputs that may transform into a database attack. In this
technique a data redirector program redirects the users input to the proxy
server before it is sent to the application server. At the proxy server, data
cleaning algorithm is triggered using a sanitizing application. In this
framework we include detection and sanitization of the tainted information
being sent to the database and innovate a new prototype.Comment: 9 pages, 6 figures, 3 tables; CIIT 2013 International Conference,
Mumba
X-Secure:protecting users from big bad wolves
In 2014 over 70% of people in Great Britain accessed the Internet every day. This resource is an optimal vector for malicious attackers to penetrate home computers and as such compromised pages have been increasing in both number and complexity. This paper presents X-Secure, a novel browser plug-in designed to present and raise the awareness of inexperienced users by analysing web-pages before malicious scripts are executed by the host computer. X-Secure was able to detect over 90% of the tested attacks and provides a danger level based on cumulative analysis of the source code, the URL, and the remote server, by using a set of heuristics, hence increasing the situational awareness of users browsing the internet
Noninvasive vagus nerve stimulation as acute therapy for migraine. The randomized PRESTO study
Objective: To evaluate the efficacy, safety, and tolerability of noninvasive vagus nerve stimulation (nVNS; gammaCore; electroCore, LLC, Basking Ridge, NJ) for the acute treatment of migraine in a multicenter, double-blind, randomized, sham-controlled trial. Methods: A total of 248 participants with episodic migraine with/without aura were randomized to receive nVNS or sham within 20 minutes from pain onset. Participants were to repeat treatment if pain had not improved in 15 minutes. Results: nVNS (n = 120) was superior to sham (n = 123) for pain freedom at 30 minutes (12.7% vs 4.2%; p = 0.012) and 60 minutes (21.0% vs 10.0%; p = 0.023) but not at 120 minutes (30.4% vs 19.7%; p = 0.067; primary endpoint; logistic regression) after the first treated attack. A post hoc repeatedmeasures test provided further insight into the therapeutic benefit of nVNS through 30, 60, and 120 minutes (odds ratio 2.3; 95% confidence interval 1.2, 4.4; p = 0.012). nVNS demonstrated benefits across other endpoints including pain relief at 120minutes and was safe and well-tolerated. Conclusion: This randomized sham-controlled trial supports the abortive efficacy of nVNS as early as 30 minutes and up to 60 minutes after an attack. Findings also suggest effective pain relief, tolerability, and practicality of nVNS for the acute treatment of episodic migraine
Heart to Heart, May 2012
Heart to Heart is a publication on new heart disease and stroke information and other related topics by the Department of Public Health
- …