‘E-SPY’: DETECTION AND PREDICTION OF WEBSITE ATTACKS
Abstract
experiencing an increase in cyber crimes like hacking, identity
and data theft and people fall prey to malicious attacks because
of lack of knowledge. SQLIA enables unauthorized users to make
use of loopholes within any system to gain access to its databases
and phish data, using tautologies, piggybacking, and union.
These intrusions can be handled by an IDS which involves
monitoring and analyzing: user activities, system activities,
configurations and vulnerabilities, abnormal activity patterns,
user policy violations, etc. IDS transforms the captured packets
to a predefined data structure. Our proposed system's slow
detection link combats the drawback of using a Snort plug-in
which obtains only the port information of the source IP-address.
An IDS can be integrated with a honeypot which allows the user
to attack to learn the pattern of various attacks and prevent such
attacks on the main system.
Keywords
Full Text:
PDFReferences
Rahul Johari and Pankaj Sharma, “A Survey On Web Application
Vulnerabilities (SQLIA, XSS) Exploitation and Security Engine for SQL
Injection” in International Conference on Communication Systems and
Network Technologies, 2012.
Michelle Ruse, Tanmoy Sarkar and Samik Basu, “Analysis & Detection of
SQL Injection Vulnerabilities via Automatic Test Case Generation of
Programs” in 10th Annual International Symposium on Applications and the
Internet, 2010.
Yohanes Wahyu Trio Pramono and Suhardi, “Design of Anomaly-based
Intrusion Detection and Prevention System for Smart City Web Application
using Rule-Growth Sequential Pattern Mining” in IEEE, 2014.
Mohammad Qbea’h, Mohammad Alshraideh and Khair Eddin Sabri, “
Detecting and Preventing SQL Injection Attacks: A formal Approach” in
Cybersecurity and Cyberforensics Conference, 2016.
Abdelhamid MAKIOU, Youcef BEGRICHE and Ahmed
SERHROUCHNI, “Improving Web Application Firewalls to Detect
Advanced SQL Injection Attacks”, in IEEE, 2014.
Anitha.V, Supha Lakshmi.A, Revathi.M and Selvi.K, “Detecting Various
SQL Injection Vulnerabilities using String Matching and LCS Method”, in
Sixth International Conference on Advanced Computing, 2014.
Hussein Alnabulsi, Md Rafiqul Islam and Quazi Mamun, “Detecting SQL
Injection Attacks Using SNORT IDS”, in IEEE, 2013.
Chunmei YIN, Mingchu LI, Jianh MA and Jizhou SUN, “Honeypot and
Scan Detection in Intrusion Detection System”, in IEEE, 2004
Umesh Hodeghatta Rao and Bishwa Prakash Pati, “Study of Internet
Security Threats Among Home Users”, in IEEE, 2012.
Loras R. Even , ‘Honey Pot Systems Explained’ , July 12, 2000, URL :
https://www.sans.org/security-resources/idfaq/what-is-a-honeypot/1/9
DOI: https://doi.org/10.26483/ijarcs.v9i1.5243
Refbacks
- There are currently no refbacks.
Copyright (c) 2018 International Journal of Advanced Research in Computer Science

