Creating a Web Application for IP Address Accountancy

2010 ◽  
pp. 75-106
Keyword(s):  
Author(s):  
Lucky Kannan ◽  
Jebakumar R

Many businesses use email as a medium for advertising and they use emails to communicate with their customers. In the email world, the most common issue that remains unresolved even now is spamming or in other terms unsolicited bulk email. Currently, there is no common way to regulate the practices of an email sender. This proposed system is to formulate a protocol common for all the ESPs or inbox providers and a centralized system that will easily find the spammers and block them. By this method, the Email Service Providers (ESPs) or Inbox Providers need not wait for the sender behaviour and then take actions on the sender or sender domain or sender IP address. Instead, they can get the sender history of reputation from blockchain where the ESPs or Inbox Provider provides a score based on the emails they have received from the sender. The ESPs can get the Public Sender Score(S3) from the mobile application or web application which provides the score management user interface and APIs. The email marketers can also monitor their score through the application.


2020 ◽  
Vol 31 (1) ◽  
pp. 1-9

Web application distributed denial-of-service attack (Web-App DDoS Attack) is a common dangerous attack that hackers use to attack the information systems of organizations. Web application is often hackers' target because this kind of application is an external interface of an organization to provide the organization's activities services. In addition, due to the emergence of weaknesses and security holes in applications and operating systems, hackers can easily create a large-scale botnet for more effective Web-App DDoS Attack. In fact, there have been many research projects related to the defense against this type of attack. However, DDoS attacks still cause serious damage to the systems of organizations due to the fact that the attack methods are increasingly sophisticated and constantly changing. In this study, we propose a method for Web-App DDoS Attack mitigation on the basis of analyzing the relationship among the requests sent to the Web application to find out the source IP address of malicious requests and to perform mitigation. Our method provides a set of criteria that allows determining whether a source IP address is normal or malicious in a short period of time. The criteria also make it difficult for hackers to change the attack methods to overcome the characteristics of the criteria.


2018 ◽  
Vol 2 (4) ◽  
pp. 286 ◽  
Author(s):  
Robinson ◽  
Memen Akbar ◽  
Muhammad Arif Fadhly Ridha

Web Application or website are widely used to provide functionality that allows companies to build and maintain relationships with their customers. The Information stored by web applications is often confidential and, if obtained by malicious attackers. Its exposure could result in substantial losses for both consumers and companies. SQL Injection and Cross Site Scripting are attacks that aiming web application database vulnerabilities. Its can allow malicious attackers to manipulate web server database that can cause various data lost, information thieving, and inconsistent of data. Therefore, this research propose the Open Web Application Security Project (OWASP) ModSecurity Core Rule Set which can help administrator securing the web servers. OWASP operate by blocking IP Address which try to breaking the security rule, monitoring network traffic and preventing suspicious network requesting from outside.


2019 ◽  
Vol 7 (4) ◽  
pp. 25-50 ◽  
Author(s):  
Ahmad A. Saifan ◽  
Mahmoud Bani Ata

Web applications provide services to hundreds of billions of people over the world, so they should be tested, to insure their validity. In this article, we are investigating the ability of testing web application based on traditional mutation testing. To perform this test, we have defined 54 mutation operators, classified into six categories: SQL data retrieving, data manipulation; domain name and IP address look up; internet protocol and service information; HTTP; connection to server and to database. The test was applied to websites that are built using PHP programming for two reasons. The majority of websites nowadays are built using ASP.net or PHP and most of the testing efforts that have been applied on web applications were using the Java programming language. We have implemented a prototype tool called μWebPHP for automatically generating mutants for PHP web applications based on the identified mutation operators. We report preliminary results that show that mutation testing is feasible for web applications.


2013 ◽  
Vol 718-720 ◽  
pp. 1967-1972
Author(s):  
Guo Fang Kuang ◽  
Chun Lin Kuang

Pv6 not only solves the problem of IP address deficient, also simplified the protocol header, and the success of the introduction of two new extension header AH and ESP. The Internet of things perceived terminal data format varied, unified management difficult operation, new business difficulty landing. The research of security Internet of things will mainly focus on the open web application security system, individual privacy protection mode of networking, security features, Internet safety laws formulation. The paper presents the novel application model of Internet of things based on IPv6 technology. Experimental results show that the proposed method has high efficiency.


2018 ◽  
Vol 12 (10) ◽  
pp. 164
Author(s):  
Saher Manaseer ◽  
Ahmad K. Al Hwaitat

In this paper we propose a centralized web firewall system for web application security which will provide a new type of synchronized system, which has the ability to  detect  and prevent a variety of web application attacks for a wide range of hosts at the same time , using an centralized command and control system, the attacked client then sends the information to a centralized command and control server which will distribute the attack information to all of the integrated clients connected to it. The distributed information contains all of the attack information including the type of attack, the IP address of the attacker, and the time of attack. The process of receiving the attacker's information and distributing it through the centralized web firewall is done automatically and immediately at the time of the attack. And all of the receiving clients will take actions against the threat depending on the distributed information such as banning the IP address of the attacker. The main process aims to protect multiple clients from any possible attack from the same attacker or the same type of attack. The system has been implemented to protect a real web application. Experiments showed that the attacks has been successfully prevented on multiple hosts at the time. This paper came to provide a centralized web firewall system that connect different web firewalls in order to detect and prevent different types of web attacks and work as a fully integrated system with the different clients.


2018 ◽  
Vol 12 (10) ◽  
pp. 13
Author(s):  
Saher Manaseer ◽  
Ahmad K. Al Hwaitat ◽  
Riad Jabri

The growth of web Applications have increased rapidly due to the huge development of technology with very short turnaround time and with this development the protection from vulnerabilities became very difficult. There is a continuous demand for developing new methods that is able to prevent the fast growth of attacking methods and vulnerabilities. Furthermore there is a great demand to have coordination between different security infrastructure and protection applications to distribution of the attack log in order to prevent the attacker from further attacks to other web hosts. This research proposes a distributed web firewall defensive mechanism which provide a synchronized environment that is consists of several synchronized web application firewalls. Every web application is protected by a web application firewall that send feedback reports that include the type of the attack, The IP Address of the attacker and time of attack to other synchronized firewalls inside the environment to take action against the attacker.


2020 ◽  
Vol 8 (1) ◽  
pp. 49-58
Author(s):  
Muhammad Yusup ◽  
Maisyaroh Maisyaroh ◽  
Laila Septiana

Gytech Indosantara Mandiri Ltd. in the last few years experienced many Cybercrime attacks on the Web Server which caused many moral and material losses. Therefore, it is necessary to consider ways to fight and prevent attacks on the webserver. One way to fight and prevent attacks is to use the Attack Signatures method by using ModSecurity and fail2ban as a Web Application Firewall (WAF). ModSecurity is used to detect and prevent the occurrence of Cyber Crime in the Http and https services. Whereas Fail2ban is used to prevent Bruteforce attacks on ssh, FTP and telnet services. Modesecurity, which acts as a Web Application Firewall (WAF) will send logs to Fail2ban when exploits occur on the Web Server. Meanwhile, Fail2ban will block the Attacker's IP address so that both can be used as a Web Application Firewall or can be used as layer 7 network security.


Sign in / Sign up

Export Citation Format

Share Document