Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Bharti Nagpal is active.

Publication


Featured researches published by Bharti Nagpal.


international conference on computing, communication and automation | 2015

Tool based implementation of SQL injection for penetration testing

Bharti Nagpal; Nanhay Singh; Naresh Chauhan; Angel Panesar

Web applications are a fundamental pillar of todays world. Society depends on them for business and day to day tasks. Because of their extensive use, Web applications are under constant attack by hackers that exploit their vulnerabilities to disrupt business and access confidential information. SQL Injection and Remote File Inclusion are the two most frequently used exploits and hackers prefer easier rather than complicated attack techniques. Every day as number of Internet users are increasing, the vulnerabilities of a system being attacked is becoming easier. SQL Injection is one of the most common attack method that is being used these days. Havij is one of the tools used to implement SQL Injection which will be discussed in this paper. Our research objective is to analyse the use of Havij in penetration testing in IT industry and to compare various SQL Injection tools available in the market.


international conference on advances in computer engineering and applications | 2015

A survey and taxonomy of various packet classification algorithms

Bharti Nagpal; Nanhay Singh; Naresh Chauhan; Radhika Murari

Routers can also function as firewalls and perform various operations on the incoming and outgoing packets. In case when all the packets share common header characteristics, it is termed as a packet flow. In order to classify a packet, routers perform a lookup on a classifier table using one or more fields from the packet header to classify the packet into its corresponding flow. A classifier is a set of rules which identify each flow and the appropriate actions to be taken for any packet belonging to that flow. The paper examines the problem of packet classification and various proposed techniques for the same.


international conference on advances in computer engineering and applications | 2015

CATCH: Comparison and analysis of tools covering honeypots

Bharti Nagpal; Nanhay Singh; Naresh Chauhan; Pratima Sharma

Honeypots act as security resources that are used to catch malign activities, so they may be anatomized and watched. During the past few years, they are called as a safeguard of assets of an organization. They are used to acquire information on interrupters in a network. This paper gives an introduction to the honeypots, their classification, detailed study of commercial as well as open source honeypots tools and comparison between them. This paper may be helpful for readers to secure their resources from intruders by using the freely available honeypots tools.


Journal of Information Processing Systems | 2017

A Survey on the Detection of SQL Injection Attacks and Their Countermeasures.

Bharti Nagpal; Naresh Chauhan; Nanhay Singh


i-manager's Journal on Computer Science | 2015

A Viable Solution to Prevent SQL Injection Attack Using SQL Injection

Bharti Nagpal; Naresh Chauhan; Nanhay Singh


International Journal of Information Technology | 2018

HONEYDOS: a hybrid approach using data mining and honeypot to counter denial of service attack and malicious packets

Pratima Sharma; Bharti Nagpal


International Journal of Systems Assurance Engineering and Management | 2017

SECSIX: security engine for CSRF, SQL injection and XSS attacks

Bharti Nagpal; Naresh Chauhan; Nanhay Singh


international conference on computing for sustainable global development | 2015

DDoS tools: Classification, analysis and comparison

Bharti Nagpal; Pratima Sharma; Naresh Chauhan; Angel Panesar


i-manager's Journal on Information Technology | 2015

Defending Against Remote File Inclusion Attacks on Web Applications

Bharti Nagpal; Naresh Chauhan; Nanhay Singh


i-manager's Journal on Information Technology | 2014

Cross-Site Request Forgery: Vulnerabilities and Defenses

Bharti Nagpal; Naresh Chauhan; Nanhay Singh

Collaboration


Dive into the Bharti Nagpal's collaboration.

Top Co-Authors

Avatar

Naresh Chauhan

YMCA University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Nanhay Singh

Ambedkar Institute of Advanced Communication Technologies and Research

View shared research outputs
Top Co-Authors

Avatar

Pratima Sharma

Guru Gobind Singh Indraprastha University

View shared research outputs
Researchain Logo
Decentralizing Knowledge