skip to main content
10.1145/2909067.2909099acmotherconferencesArticle/Chapter ViewAbstractPublication PageswirConference Proceedingsconference-collections
research-article

System Attribute Measures of Network Security Analyzer

Authors Info & Claims
Published:21 March 2016Publication History

ABSTRACT

In this paper, we have mentioned a method to find the performance of projectwhich detects various web - attacks. The project is capable to identifying and preventing attacks like SQL Injection, Cross -- Site Scripting, URL rewriting, Web server 400 error code etc. The performance of system is detected using the system attributes that are mentioned in this paper. This is also used to determine efficiency of the system.

References

  1. Shwetambari Pawar, Nilakshi Jain, "Network Security Analyzer: Detection and Prevention of Web Attacks", International Conference on ICT for Intelligent Systems (ICTIS 2015).Google ScholarGoogle Scholar
  2. Abdul Razzaq, Ali Hur, Sidra Shahbaz, Muddassar Masood, H Farooq Ahmad, "Critical Analysis on Web Application Firewall Solutions", Autonomous Decentralized Systems (ISADS), 2013 IEEE Eleventh International Symposium, pp. 1--6, March 2013.Google ScholarGoogle Scholar
  3. Wen Kai Guo Fan, "An Adaptive Anomaly Detection of WEB-based attacks", Computer Science & Education (ICCSE), 2012 7th International Conference, pp. 690--694, July 2012.Google ScholarGoogle Scholar
  4. Garuba, M.; Chunmei Liu; Washington, N. "A Comparative Analysis of Anti-Malware Software, Patch Management, and Host-Based Firewalls in Preventing Malware Infections on Client Computers". Information Technology: New Generations, 2008. ITNG 2008. Fifth International Conference, pp. 628--632, April 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. M. Dabbour, I. Alsmadi, and E. Alsukhni, "Efficient Assessment and Evaluation for Websites Vulnerabilities Using SNORT", International Jouranl of Security and Its Applications, Vol. 7, pp. 7--16, January 2013.Google ScholarGoogle Scholar
  6. Yu Sun; Dake He,"Model Checking for the Defense against Cross-site Scripting Attacks", Computer Science and Service (CSSS) International Conference, pp. 2161--2164, August 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Nguyen Manh Hung; Vu Duy Nhat, "B-tree based two-dimensional early packet rejection technique against DoS traffic targeting firewall default security rule". Computational Intelligence for Security and Defense Applications (CISDA), 2014 Seventh IEEE Symposium, pp. 1--6, December 2014.Google ScholarGoogle Scholar
  8. Nilakshi Jain, Shwetambari Pawar, "Firewall Attacks and Counter Measures", International Journal of Trend in Research and Development, Volume 2(5), ISSN 2394-9333, pp. 277--280, Sep - Oct 2015.Google ScholarGoogle Scholar
  9. Xinqiang Li; Lili Yu; Lihuan Wei, "The Application of Hybrid Encryption Algorithm in Software Security". Computational Intelligence and Communication Networks (CICN), 2012 Fourth International Conference, pp. 762--765, November 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    WIR '16: Proceedings of the ACM Symposium on Women in Research 2016
    March 2016
    179 pages
    ISBN:9781450342780
    DOI:10.1145/2909067

    Copyright © 2016 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 21 March 2016

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

    Acceptance Rates

    WIR '16 Paper Acceptance Rate35of117submissions,30%Overall Acceptance Rate35of117submissions,30%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader