Review Article
A Closer Look at Intrusion Detection System for Web Applications
Table 2
Web vulnerabilities and security measures.
| Security Measures | Web Vulnerabilities |
| Input Validation | Injection, cross-site scripting and unvalidated redirects and forwards | Output Validation | Injection, sensitive data exposure and using components with known vulnerabilities | Access Control | Broken authentication and session management, insecure direct object reference, security misconfiguration and missing function level access control | Session Verification | Broken authentication and session management and cross-site request forgery | Bot Detection | Insufficient monitoring mechanism |
|
|