‘E-SPY’: DETECTION AND PREDICTION OF WEBSITE ATTACKS

Falguni Jindal, Serena Lekhrajani, Sanyuktha Kumbla, Rashi Baid, Sanjay Deshmukh

Abstract


While making the world smaller, internet is
experiencing an increase in cyber crimes like hacking, identity
and data theft and people fall prey to malicious attacks because
of lack of knowledge. SQLIA enables unauthorized users to make
use of loopholes within any system to gain access to its databases
and phish data, using tautologies, piggybacking, and union.
These intrusions can be handled by an IDS which involves
monitoring and analyzing: user activities, system activities,
configurations and vulnerabilities, abnormal activity patterns,
user policy violations, etc. IDS transforms the captured packets
to a predefined data structure. Our proposed system's slow
detection link combats the drawback of using a Snort plug-in
which obtains only the port information of the source IP-address.
An IDS can be integrated with a honeypot which allows the user
to attack to learn the pattern of various attacks and prevent such
attacks on the main system.

Keywords


Intrusion Detection System (IDS); Intrusion Prevention System (IPS); Security; Denial of Service (DoS) , Structured Query Language Intrusion Detection ( SQLIA)

Full Text:

PDF

References


Rahul Johari and Pankaj Sharma, “A Survey On Web Application

Vulnerabilities (SQLIA, XSS) Exploitation and Security Engine for SQL

Injection” in International Conference on Communication Systems and

Network Technologies, 2012.

Michelle Ruse, Tanmoy Sarkar and Samik Basu, “Analysis & Detection of

SQL Injection Vulnerabilities via Automatic Test Case Generation of

Programs” in 10th Annual International Symposium on Applications and the

Internet, 2010.

Yohanes Wahyu Trio Pramono and Suhardi, “Design of Anomaly-based

Intrusion Detection and Prevention System for Smart City Web Application

using Rule-Growth Sequential Pattern Mining” in IEEE, 2014.

Mohammad Qbea’h, Mohammad Alshraideh and Khair Eddin Sabri, “

Detecting and Preventing SQL Injection Attacks: A formal Approach” in

Cybersecurity and Cyberforensics Conference, 2016.

Abdelhamid MAKIOU, Youcef BEGRICHE and Ahmed

SERHROUCHNI, “Improving Web Application Firewalls to Detect

Advanced SQL Injection Attacks”, in IEEE, 2014.

Anitha.V, Supha Lakshmi.A, Revathi.M and Selvi.K, “Detecting Various

SQL Injection Vulnerabilities using String Matching and LCS Method”, in

Sixth International Conference on Advanced Computing, 2014.

Hussein Alnabulsi, Md Rafiqul Islam and Quazi Mamun, “Detecting SQL

Injection Attacks Using SNORT IDS”, in IEEE, 2013.

Chunmei YIN, Mingchu LI, Jianh MA and Jizhou SUN, “Honeypot and

Scan Detection in Intrusion Detection System”, in IEEE, 2004

Umesh Hodeghatta Rao and Bishwa Prakash Pati, “Study of Internet

Security Threats Among Home Users”, in IEEE, 2012.

Loras R. Even , ‘Honey Pot Systems Explained’ , July 12, 2000, URL :

https://www.sans.org/security-resources/idfaq/what-is-a-honeypot/1/9




DOI: https://doi.org/10.26483/ijarcs.v9i1.5243

Refbacks

  • There are currently no refbacks.




Copyright (c) 2018 International Journal of Advanced Research in Computer Science