Local and Remote File Inclusion

  • Michal Hubczyk
  • Adam Domanski
  • Joanna Domanska
Part of the Advances in Intelligent and Soft Computing book series (AINSC, volume 118)

Abstract

In this paper we have examined Local and Remote File Inclusion vulnerabilities in details. It is proven that these security flaws may lead to variety of problems including generation of big load to the server as well as disclosure of files which should not be accessible by the clients. These attacks are not so popular as SQL injection or Cross-Site Scripting but still they are subject of serious threat because of their consequences.

Keywords

Processor Time Memory Consumption Processor Usage Maximum Execution Time Concurrent Request 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

Copyright information

© Springer-Verlag GmbH Berlin Heidelberg 2012

Authors and Affiliations

  • Michal Hubczyk
    • 1
  • Adam Domanski
    • 1
  • Joanna Domanska
    • 2
  1. 1.Institute of InformaticsSilesian Technical UniversityGliwicePoland
  2. 2.Institute of Theoretical and Applied InformaticsPolish Academy of SciencesGliwicePoland

Personalised recommendations