Toward Tracing the Source of Web Attacks Targeted at Web Applications

2021 ◽  
Author(s):  
Shuo Wen ◽  
Qi Wu ◽  
Xingmin Wu ◽  
Yi Ling ◽  
Zhilong Ye
Keyword(s):  
2013 ◽  
Vol 756-759 ◽  
pp. 2428-2432
Author(s):  
Xiao Jing Zhu ◽  
Yuan Guai Lin

With the growing popularity of Web applications and Web attacks increasing; Web applications protection and data security have become the core focus of the information security system of enterprises and institutions. The paper briefly presents the harm of the common several kinds of Web attacks, and analyzes their principle, gives their defense measures. On this basis, the defense system of both software and hardware design is proposed. It achieves software defense design based on Web software development and Web application management, and hardware defense design based on H3C SecBlade IPS, to effectively guarantee the security of Web applications.


2014 ◽  
Vol 5 (1) ◽  
pp. 19-38
Author(s):  
Romaric Ludinard ◽  
Éric Totel ◽  
Frédéric Tronel ◽  
Vincent Nicomette ◽  
Mohamed Kaâniche ◽  
...  

RRABIDS (Ruby on Rails Anomaly Based Intrusion Detection System) is an application level intrusion detection system (IDS) for applications implemented with the Ruby on Rails framework. The goal of this intrusion detection system is to detect attacks against data in the context of web applications. This anomaly based IDS focuses on the modelling of the normal application profile using invariants. These invariants are discovered during a learning phase. Then, they are used to instrument the web application at source code level, so that a deviation from the normal profile can be detected at run-time. This paper illustrates on simple examples how the approach detects well-known categories of web attacks that involve a state violation of the application, such as SQL injections. Finally, an assessment phase is performed to evaluate the accuracy of the detection provided by the proposed approach.


2018 ◽  
Vol 2018 ◽  
pp. 1-27 ◽  
Author(s):  
Nancy Agarwal ◽  
Syed Zeeshan Hussain

Intrusion Detection System (IDS) acts as a defensive tool to detect the security attacks on the web. IDS is a known methodology for detecting network-based attacks but is still immature in monitoring and identifying web-based application attacks. The objective of this research paper is to present a design methodology for efficient IDS with respect to web applications. In this paper, we present several specific aspects which make it challenging for an IDS to monitor and detect web attacks. The article also provides a comprehensive overview of the existing detection systems exclusively designed to observe web traffic. Furthermore, we identify various dimensions for comparing the IDS from different perspectives based on their design and functionalities. We also propose a conceptual framework of a web IDS with a prevention mechanism to offer systematic guidance for the implementation of the system. We compare its features with five existing detection systems, namely, AppSensor, PHPIDS, ModSecurity, Shadow Daemon, and AQTRONIX WebKnight. This paper will highly facilitate the interest groups with the cutting-edge information to understand the stronger and weaker sections of the domain and provide a firm foundation for developing an intelligent and efficient system.


Author(s):  
Romaric Ludinard ◽  
Éric Totel ◽  
Frédéric Tronel ◽  
Vincent Nicomette ◽  
Mohamed Kaâniche ◽  
...  

RRABIDS (Ruby on Rails Anomaly Based Intrusion Detection System) is an application level intrusion detection system (IDS) for applications implemented with the Ruby on Rails framework. The goal of this intrusion detection system is to detect attacks against data in the context of web applications. This anomaly based IDS focuses on the modelling of the normal application profile using invariants. These invariants are discovered during a learning phase. Then, they are used to instrument the web application at source code level, so that a deviation from the normal profile can be detected at run-time. This paper illustrates on simple examples how the approach detects well-known categories of web attacks that involve a state violation of the application, such as SQL injections. Finally, an assessment phase is performed to evaluate the accuracy of the detection provided by the proposed approach.


Cyber security refers to a set of well-defined techniques used to protect the integrity of networks. It is used to protect vital data of customers and to restrict unauthorised access. In the era of E-Commerce, the demand for websites, web application increasing exponentially day by day. Web security is currently a significant issue for Internet enabled organization. Using websites, managing information through digital way. HTTP is a Hyper Text Transfer Protocol. It is used to transfer information over the internet. HTTP is most popular protocol widely used in web applications and allowed by internet firewalls, operating systems. HTTP is an unsecured information exchange protocol. Integrity is not there, so someone can easily alter with the content. In the internet data transferring over HTTP connection in plain text, this opening new loop hole to attackers to read every data sent over HTTP connection to web or webserver. Http is insecure as there is no encryption methods for it. So, it subjected towards the web attacks such as Man in the middle, cross site scripting, SQL Injection, click jacking, Broken authentication and session management attacks can occur. HTTP interaction with TCP is bad, causes the problems with performances and server scalability. In our proposed system, document which is used by more than one user and if there is in updation of the content user who is modifying the content of thier shared document must take their concern from other users. The process which is being used to authenticate the modifications of content of shared document is done with the help of shared key unless or until all users send the shared keys of each user the document will not be decrypted and hence further the changes in the document will not be possible.


2018 ◽  
pp. 49-57
Author(s):  
N. A. Gluzman

In the modern educational space regarding the realities of the information society special importance is attached to issues related to the provision of a high level of informatization of education, which implies teachers’ mastering the necessary competencies and the ability to introduce e-learning resources into educational and training practice. Adobe Flash as one of the platforms for creating web applications and multimedia presentations enjoys greatest popularity with users including teachers. However, in connection with the announcement of discontinuing Adobe Flash support in 2020, the issue of choosing an analog to create web applications and presentations for use in teaching purposes is becoming particularly relevant. The article provides a comprehensive analysis of developing electronic educational resources by teachers using Adobe Flash and HTML5 for teaching math in primary school.


Author(s):  
Maragathavalli P. ◽  
Seshankkumar M. ◽  
Dhivakaran V. ◽  
Ravindran S.

Author(s):  
Lalit Kumar Garg ◽  
◽  
Preeti Rani ◽  
Deepika Goyal ◽  
◽  
...  

Author(s):  
Amit Sharma

Distributed Denial of Service attacks are significant dangers these days over web applications and web administrations. These assaults pushing ahead towards application layer to procure furthermore, squander most extreme CPU cycles. By asking for assets from web benefits in gigantic sum utilizing quick fire of solicitations, assailant robotized programs use all the capacity of handling of single server application or circulated environment application. The periods of the plan execution is client conduct checking and identification. In to beginning with stage by social affair the data of client conduct and computing individual user’s trust score will happen and Entropy of a similar client will be ascertained. HTTP Unbearable Load King (HULK) attacks are also evaluated. In light of first stage, in recognition stage, variety in entropy will be watched and malevolent clients will be recognized. Rate limiter is additionally acquainted with stop or downsize serving the noxious clients. This paper introduces the FAÇADE layer for discovery also, hindering the unapproved client from assaulting the framework.


Sign in / Sign up

Export Citation Format

Share Document