‘E-SPY’: DETECTION AND PREDICTION OF WEBSITE ATTACKS
Main Article Content
Abstract
experiencing an increase in cyber crimes like hacking, identity
and data theft and people fall prey to malicious attacks because
of lack of knowledge. SQLIA enables unauthorized users to make
use of loopholes within any system to gain access to its databases
and phish data, using tautologies, piggybacking, and union.
These intrusions can be handled by an IDS which involves
monitoring and analyzing: user activities, system activities,
configurations and vulnerabilities, abnormal activity patterns,
user policy violations, etc. IDS transforms the captured packets
to a predefined data structure. Our proposed system's slow
detection link combats the drawback of using a Snort plug-in
which obtains only the port information of the source IP-address.
An IDS can be integrated with a honeypot which allows the user
to attack to learn the pattern of various attacks and prevent such
attacks on the main system.
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
Rahul Johari and Pankaj Sharma, “A Survey On Web Application
Vulnerabilities (SQLIA, XSS) Exploitation and Security Engine for SQL
Injection†in International Conference on Communication Systems and
Network Technologies, 2012.
Michelle Ruse, Tanmoy Sarkar and Samik Basu, “Analysis & Detection of
SQL Injection Vulnerabilities via Automatic Test Case Generation of
Programs†in 10th Annual International Symposium on Applications and the
Internet, 2010.
Yohanes Wahyu Trio Pramono and Suhardi, “Design of Anomaly-based
Intrusion Detection and Prevention System for Smart City Web Application
using Rule-Growth Sequential Pattern Mining†in IEEE, 2014.
Mohammad Qbea’h, Mohammad Alshraideh and Khair Eddin Sabri, “
Detecting and Preventing SQL Injection Attacks: A formal Approach†in
Cybersecurity and Cyberforensics Conference, 2016.
Abdelhamid MAKIOU, Youcef BEGRICHE and Ahmed
SERHROUCHNI, “Improving Web Application Firewalls to Detect
Advanced SQL Injection Attacksâ€, in IEEE, 2014.
Anitha.V, Supha Lakshmi.A, Revathi.M and Selvi.K, “Detecting Various
SQL Injection Vulnerabilities using String Matching and LCS Methodâ€, in
Sixth International Conference on Advanced Computing, 2014.
Hussein Alnabulsi, Md Rafiqul Islam and Quazi Mamun, “Detecting SQL
Injection Attacks Using SNORT IDSâ€, in IEEE, 2013.
Chunmei YIN, Mingchu LI, Jianh MA and Jizhou SUN, “Honeypot and
Scan Detection in Intrusion Detection Systemâ€, in IEEE, 2004
Umesh Hodeghatta Rao and Bishwa Prakash Pati, “Study of Internet
Security Threats Among Home Usersâ€, in IEEE, 2012.
Loras R. Even , ‘Honey Pot Systems Explained’ , July 12, 2000, URL :
https://www.sans.org/security-resources/idfaq/what-is-a-honeypot/1/9