Bharti Nagpal
Guru Gobind Singh Indraprastha University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Bharti Nagpal.
international conference on computing, communication and automation | 2015
Bharti Nagpal; Nanhay Singh; Naresh Chauhan; Angel Panesar
Web applications are a fundamental pillar of todays world. Society depends on them for business and day to day tasks. Because of their extensive use, Web applications are under constant attack by hackers that exploit their vulnerabilities to disrupt business and access confidential information. SQL Injection and Remote File Inclusion are the two most frequently used exploits and hackers prefer easier rather than complicated attack techniques. Every day as number of Internet users are increasing, the vulnerabilities of a system being attacked is becoming easier. SQL Injection is one of the most common attack method that is being used these days. Havij is one of the tools used to implement SQL Injection which will be discussed in this paper. Our research objective is to analyse the use of Havij in penetration testing in IT industry and to compare various SQL Injection tools available in the market.
international conference on advances in computer engineering and applications | 2015
Bharti Nagpal; Nanhay Singh; Naresh Chauhan; Radhika Murari
Routers can also function as firewalls and perform various operations on the incoming and outgoing packets. In case when all the packets share common header characteristics, it is termed as a packet flow. In order to classify a packet, routers perform a lookup on a classifier table using one or more fields from the packet header to classify the packet into its corresponding flow. A classifier is a set of rules which identify each flow and the appropriate actions to be taken for any packet belonging to that flow. The paper examines the problem of packet classification and various proposed techniques for the same.
international conference on advances in computer engineering and applications | 2015
Bharti Nagpal; Nanhay Singh; Naresh Chauhan; Pratima Sharma
Honeypots act as security resources that are used to catch malign activities, so they may be anatomized and watched. During the past few years, they are called as a safeguard of assets of an organization. They are used to acquire information on interrupters in a network. This paper gives an introduction to the honeypots, their classification, detailed study of commercial as well as open source honeypots tools and comparison between them. This paper may be helpful for readers to secure their resources from intruders by using the freely available honeypots tools.
Journal of Information Processing Systems | 2017
Bharti Nagpal; Naresh Chauhan; Nanhay Singh
i-manager's Journal on Computer Science | 2015
Bharti Nagpal; Naresh Chauhan; Nanhay Singh
International Journal of Information Technology | 2018
Pratima Sharma; Bharti Nagpal
International Journal of Systems Assurance Engineering and Management | 2017
Bharti Nagpal; Naresh Chauhan; Nanhay Singh
international conference on computing for sustainable global development | 2015
Bharti Nagpal; Pratima Sharma; Naresh Chauhan; Angel Panesar
i-manager's Journal on Information Technology | 2015
Bharti Nagpal; Naresh Chauhan; Nanhay Singh
i-manager's Journal on Information Technology | 2014
Bharti Nagpal; Naresh Chauhan; Nanhay Singh
Collaboration
Dive into the Bharti Nagpal's collaboration.
Ambedkar Institute of Advanced Communication Technologies and Research
View shared research outputs