Reacting to Attacks
In addition to alerting administrators, many security-critical applications con-
tain built-in mechanisms to react defensively to users who are identified as
potentially malicious.
Because each application is different, most real-world attacks require an
attacker to probe systematically for vulnerabilities, submitting numerous
requests containing crafted input designed to indicate the presence of various
common vulnerabilities. Effective input validation mechanisms will identify
many of these requests as potentially malicious, and block the input from
Do'stlaringiz bilan baham: |