Web Application Security: Protection from Advanced Persistent Threat

  • Unique Paper ID: 146494
  • PageNo: 954-960
  • Abstract:
  • A group of quite skilled, sophisticated, well organized and motivated person’s experts in the field of cyber security exploit that vulnerability to inject a code into your system with a sole intent of extracting some valuable information. These are called web based attacks and unfortunately such a web based attacks are quite common. These Web attacks very dangerous, unfortunately these attacks can’t be treated like any other types of attacks. We require web protection applications to protect our system from such attacks; this will prevent the attacker the access to our system and will remain undetectable for a longer period. The most common tricks the attacker’s uses are the Adaptive phishing and spear phishing techniques, Cross site scripting and SQL injection etc. In our study, firstly we will describe a model that will help us to understand various attack vectors commonly used for launching and triggering of APT attacks. Secondly we will describe a framework which can be used a framework, which can be used as guidance to analyze, prevent and detect the APT activities inside the application, system, and the network.

Copyright & License

Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{146494,
        author = {Shailja Yadav and Sharvan Kumar},
        title = {Web Application Security: Protection from Advanced Persistent Threat},
        journal = {International Journal of Innovative Research in Technology},
        year = {},
        volume = {4},
        number = {12},
        pages = {954-960},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=146494},
        abstract = {A group of quite skilled, sophisticated, well organized and motivated person’s experts in the field of cyber security exploit that vulnerability to inject a code into your system with a sole intent of extracting some valuable information. These are called web based attacks and unfortunately such a web based attacks are quite common. These Web attacks very dangerous, unfortunately these attacks can’t be treated like any other types of attacks. We require web protection applications to protect our system from such attacks; this will prevent the attacker the access to our system and will remain undetectable for a longer period. The most common tricks the attacker’s uses are the Adaptive phishing and spear phishing techniques, Cross site scripting and SQL injection etc. In our study, firstly we will describe a model that will help us to understand various attack vectors commonly used for launching and triggering of APT attacks. Secondly we will describe a framework which can be used a framework, which can be used as guidance to analyze, prevent and detect the APT activities inside the application, system, and the network. },
        keywords = {Advanced Persistent Threat (APT), Web Application Security, Cross site scripting (XSS), Cross site request forgery (CSRF), SQL injection Attack (SQLIA).},
        month = {},
        }

Cite This Article

Yadav, S., & Kumar, S. (). Web Application Security: Protection from Advanced Persistent Threat. International Journal of Innovative Research in Technology (IJIRT), 4(12), 954–960.

Related Articles