skip to main content
10.1145/2905055.2905120acmotherconferencesArticle/Chapter ViewAbstractPublication PagesictcsConference Proceedingsconference-collections
research-article

Analytic Hierarchy Process (AHP) to Find Most Probable Web Attack on an E-Commerce Site

Published:04 March 2016Publication History

ABSTRACT

Attackers are using various techniques to attack on an E-Commerce site; they do have various options to initiate attack. On other hand web administrators finding it difficult to prioritize the defense mechanism against each web attack. The Analytic Hierarchy Process (AHP) is an effective method in dealing with the situations where we need to select one among available alternatives or prioritize them according to their severity. Here we try to focus on some major type of attacks which are most offensively happening on the web-services; like Cross-Site Scripting Attack, DoS Attack, SQL Injection Attack and Man-in-Middle Attack. These top online web attack methods were chosen to decide the most probable happening attack on a website. The prposed methods shows step by step approach to find the most probable alternative that hackers could first use to do the attack.On the basis of this model the administrator can take care of it at first place.

References

  1. Thomas L. Saaty, "Decision making with the analytic hierarchy process", Int. J. Services Sciences, Vol. 1, No. 1, 2008, Inderscience Enterprises Ltd.Google ScholarGoogle ScholarCross RefCross Ref
  2. John K. Waters, "More attackers targeting e-commerce and Web apps, says Symantec", ADTMAG,Google ScholarGoogle Scholar
  3. Thomas L Saaty, "How to Make a Decision: "Analytic Hierarchical Process", European Journal of Operational Research, 48, (1990) 9--26, North Holland.Google ScholarGoogle ScholarCross RefCross Ref
  4. Evangelos Triantaphyllou, Stuart H. Mann, "Using the Analytic Hierarchy Process For Decision Making In Engineering Applications: Some Challenges", Inter'l Journal of Industrial Engineering: Applications and Practice, Vol. 2, No. 1, pp. 35--44, 1995.Google ScholarGoogle Scholar
  5. Thomas L Saaty, "Decision-making with the AHP: Why is the Principal Eigenvector Necessary", European Journal of Operational Research, 145 (2003) 85--91, Elsevier -2003.Google ScholarGoogle ScholarCross RefCross Ref
  6. Owasp Top 10 web application Threats: Accessed online https://www.owasp.org/index.php/Top_10_2013-IntroductionGoogle ScholarGoogle Scholar
  7. Navimumbai cyber crime record published in Mid-Day, Feb 2015 http://www.mid-day.com/articles/cyber-crime-doubles-in-navi-mumbai-in-2-years/15989157Google ScholarGoogle Scholar
  8. Rise in cyber crime cases by 60%- Times of India http://timesofindia.indiatimes.com/city/navi-mumbai/Navi-Mumbai-witnesses-spurt-in-cyber-crime-cases/articleshow/44986732.cmsGoogle ScholarGoogle Scholar
  9. Cyber crime cases continue to rise- Times of India. http://timesofindia.indiatimes.com/india/Cyber-crime-cases-under-IT-Act-continue-to-rise-shows-govt-data/articleshow/46683053.cmsGoogle ScholarGoogle Scholar
  10. National Crime Records Bureau data portal- Ministry of Home affairs, Govt. of India. https://data.gov.in/catalog/cases-registered-under-cyber-crimes-motivesGoogle ScholarGoogle Scholar
  11. Government of Maharashtra, Cyber crime cases registered. http://mahacid.com/Chapter-18%20(408-417)%20Computer%20crime,%20Cyber%20crime.pdfGoogle ScholarGoogle Scholar
  1. Analytic Hierarchy Process (AHP) to Find Most Probable Web Attack on an E-Commerce Site

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICTCS '16: Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies
      March 2016
      843 pages
      ISBN:9781450339629
      DOI:10.1145/2905055

      Copyright © 2016 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 4 March 2016

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      Overall Acceptance Rate97of270submissions,36%
    • Article Metrics

      • Downloads (Last 12 months)5
      • Downloads (Last 6 weeks)1

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader