ABSTRACT
Attackers are using various techniques to attack on an E-Commerce site; they do have various options to initiate attack. On other hand web administrators finding it difficult to prioritize the defense mechanism against each web attack. The Analytic Hierarchy Process (AHP) is an effective method in dealing with the situations where we need to select one among available alternatives or prioritize them according to their severity. Here we try to focus on some major type of attacks which are most offensively happening on the web-services; like Cross-Site Scripting Attack, DoS Attack, SQL Injection Attack and Man-in-Middle Attack. These top online web attack methods were chosen to decide the most probable happening attack on a website. The prposed methods shows step by step approach to find the most probable alternative that hackers could first use to do the attack.On the basis of this model the administrator can take care of it at first place.
- Thomas L. Saaty, "Decision making with the analytic hierarchy process", Int. J. Services Sciences, Vol. 1, No. 1, 2008, Inderscience Enterprises Ltd.Google ScholarCross Ref
- John K. Waters, "More attackers targeting e-commerce and Web apps, says Symantec", ADTMAG,Google Scholar
- Thomas L Saaty, "How to Make a Decision: "Analytic Hierarchical Process", European Journal of Operational Research, 48, (1990) 9--26, North Holland.Google ScholarCross Ref
- Evangelos Triantaphyllou, Stuart H. Mann, "Using the Analytic Hierarchy Process For Decision Making In Engineering Applications: Some Challenges", Inter'l Journal of Industrial Engineering: Applications and Practice, Vol. 2, No. 1, pp. 35--44, 1995.Google Scholar
- Thomas L Saaty, "Decision-making with the AHP: Why is the Principal Eigenvector Necessary", European Journal of Operational Research, 145 (2003) 85--91, Elsevier -2003.Google ScholarCross Ref
- Owasp Top 10 web application Threats: Accessed online https://www.owasp.org/index.php/Top_10_2013-IntroductionGoogle Scholar
- Navimumbai cyber crime record published in Mid-Day, Feb 2015 http://www.mid-day.com/articles/cyber-crime-doubles-in-navi-mumbai-in-2-years/15989157Google Scholar
- Rise in cyber crime cases by 60%- Times of India http://timesofindia.indiatimes.com/city/navi-mumbai/Navi-Mumbai-witnesses-spurt-in-cyber-crime-cases/articleshow/44986732.cmsGoogle Scholar
- Cyber crime cases continue to rise- Times of India. http://timesofindia.indiatimes.com/india/Cyber-crime-cases-under-IT-Act-continue-to-rise-shows-govt-data/articleshow/46683053.cmsGoogle Scholar
- National Crime Records Bureau data portal- Ministry of Home affairs, Govt. of India. https://data.gov.in/catalog/cases-registered-under-cyber-crimes-motivesGoogle Scholar
- Government of Maharashtra, Cyber crime cases registered. http://mahacid.com/Chapter-18%20(408-417)%20Computer%20crime,%20Cyber%20crime.pdfGoogle Scholar
- Analytic Hierarchy Process (AHP) to Find Most Probable Web Attack on an E-Commerce Site
Recommendations
Enhanced-Adaptive Pattern Attack Recognition Technique E-APART Against EDoS Attacks in Cloud Computing
Cloud Computing is most widely used in current technology. It provides a higher availability of resources to greater number of end users. In the cloud era, security has develop a reformed source of worries. Distributed Denial of Service DDoS and ...
Evaluation of TFTP DDoS amplification attack
Web threats are becoming a major issue for both governments and companies. Generally, web threats increased as much as 600% during last year (WebSense, 2013). This appears to be a significant issue, since many major businesses seem to provide these ...
Survey of network-based defense mechanisms countering the DoS and DDoS problems
This article presents a survey of denial of service attacks and the methods that have been proposed for defense against these attacks. In this survey, we analyze the design decisions in the Internet that have created the potential for denial of service ...
Comments