ABSTRACT
In this paper, we have mentioned a method to find the performance of projectwhich detects various web - attacks. The project is capable to identifying and preventing attacks like SQL Injection, Cross -- Site Scripting, URL rewriting, Web server 400 error code etc. The performance of system is detected using the system attributes that are mentioned in this paper. This is also used to determine efficiency of the system.
- Shwetambari Pawar, Nilakshi Jain, "Network Security Analyzer: Detection and Prevention of Web Attacks", International Conference on ICT for Intelligent Systems (ICTIS 2015).Google Scholar
- Abdul Razzaq, Ali Hur, Sidra Shahbaz, Muddassar Masood, H Farooq Ahmad, "Critical Analysis on Web Application Firewall Solutions", Autonomous Decentralized Systems (ISADS), 2013 IEEE Eleventh International Symposium, pp. 1--6, March 2013.Google Scholar
- Wen Kai Guo Fan, "An Adaptive Anomaly Detection of WEB-based attacks", Computer Science & Education (ICCSE), 2012 7th International Conference, pp. 690--694, July 2012.Google Scholar
- Garuba, M.; Chunmei Liu; Washington, N. "A Comparative Analysis of Anti-Malware Software, Patch Management, and Host-Based Firewalls in Preventing Malware Infections on Client Computers". Information Technology: New Generations, 2008. ITNG 2008. Fifth International Conference, pp. 628--632, April 2008. Google ScholarDigital Library
- M. Dabbour, I. Alsmadi, and E. Alsukhni, "Efficient Assessment and Evaluation for Websites Vulnerabilities Using SNORT", International Jouranl of Security and Its Applications, Vol. 7, pp. 7--16, January 2013.Google Scholar
- Yu Sun; Dake He,"Model Checking for the Defense against Cross-site Scripting Attacks", Computer Science and Service (CSSS) International Conference, pp. 2161--2164, August 2012. Google ScholarDigital Library
- Nguyen Manh Hung; Vu Duy Nhat, "B-tree based two-dimensional early packet rejection technique against DoS traffic targeting firewall default security rule". Computational Intelligence for Security and Defense Applications (CISDA), 2014 Seventh IEEE Symposium, pp. 1--6, December 2014.Google Scholar
- Nilakshi Jain, Shwetambari Pawar, "Firewall Attacks and Counter Measures", International Journal of Trend in Research and Development, Volume 2(5), ISSN 2394-9333, pp. 277--280, Sep - Oct 2015.Google Scholar
- Xinqiang Li; Lili Yu; Lihuan Wei, "The Application of Hybrid Encryption Algorithm in Software Security". Computational Intelligence and Communication Networks (CICN), 2012 Fourth International Conference, pp. 762--765, November 2012. Google ScholarDigital Library
Recommendations
SecuBat: a web vulnerability scanner
WWW '06: Proceedings of the 15th international conference on World Wide WebAs the popularity of the web increases and web applications become tools of everyday use, the role of web security has been gaining importance as well. The last years have shown a significant increase in the number of web-based attacks. For example, ...
Securing web applications from injection and logic vulnerabilities
Context: Web applications are trusted by billions of users for performing day-to-day activities. Accessibility, availability and omnipresence of web applications have made them a prime target for attackers. A simple implementation flaw in the ...
Preventing Input Validation Vulnerabilities in Web Applications through Automated Type Analysis
COMPSAC '12: Proceedings of the 2012 IEEE 36th Annual Computer Software and Applications ConferenceWeb applications have become an integral part of the daily lives of millions of users. Unfortunately, web applications are also frequently targeted by attackers, and criticial vulnerabilities such as cross-site scripting and SQL injection are still ...
Comments