Web Threats Detection and Prevention Framework

Osama Rababah, A. K. Hwaitat, S. Manaseer, H. Fakhouri, R. Halaseh
{"title":"Web Threats Detection and Prevention Framework","authors":"Osama Rababah, A. K. Hwaitat, S. Manaseer, H. Fakhouri, R. Halaseh","doi":"10.4236/cn.2016.83017","DOIUrl":null,"url":null,"abstract":"The rapid advancement in technology and the increased number of web applications with very \nshort turnaround time caused an increased need for protection from vulnerabilities that grew due \nto decision makers overlooking the need to be protected from attackers or software developers \nlacking the skills and experience in writing secure code. Structured Query Language (SQL) Injection, \ncross-site scripting (XSS), Distributed Denial of service (DDos) and suspicious user behaviour \nare some of the common types of vulnerabilities in web applications by which the attacker can \ndisclose the web application sensitive information such as credit card numbers and other confidential \ninformation. This paper proposes a framework for the detection and prevention of web \nthreats (WTDPF) which is based on preventing the attacker from gaining access to confidential \ndata by studying his behavior during the action of attack and taking preventive measures to reduce \nthe risks of the attack and as well reduce the consequences of such malicious action. The \nframework consists of phases which begin with the input checking phase, signature based action \ncomponent phase, alert and response phases. Additionally, the framework has a logging functionality \nto store and keep track of any action taking place and as well preserving information about \nthe attacker IP address, date and time of the attack, type of the attack, and the mechanism the attacker \nused. Moreover, we provide experimental results for different kinds of attacks, and we illustrate \nthe success of the proposed framework for dealing with and preventing malicious actions.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"439 1","pages":"170-178"},"PeriodicalIF":0.0000,"publicationDate":"2016-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4236/cn.2016.83017","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9

Abstract

The rapid advancement in technology and the increased number of web applications with very short turnaround time caused an increased need for protection from vulnerabilities that grew due to decision makers overlooking the need to be protected from attackers or software developers lacking the skills and experience in writing secure code. Structured Query Language (SQL) Injection, cross-site scripting (XSS), Distributed Denial of service (DDos) and suspicious user behaviour are some of the common types of vulnerabilities in web applications by which the attacker can disclose the web application sensitive information such as credit card numbers and other confidential information. This paper proposes a framework for the detection and prevention of web threats (WTDPF) which is based on preventing the attacker from gaining access to confidential data by studying his behavior during the action of attack and taking preventive measures to reduce the risks of the attack and as well reduce the consequences of such malicious action. The framework consists of phases which begin with the input checking phase, signature based action component phase, alert and response phases. Additionally, the framework has a logging functionality to store and keep track of any action taking place and as well preserving information about the attacker IP address, date and time of the attack, type of the attack, and the mechanism the attacker used. Moreover, we provide experimental results for different kinds of attacks, and we illustrate the success of the proposed framework for dealing with and preventing malicious actions.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Web威胁检测和预防框架
技术的快速发展和周转时间非常短的web应用程序数量的增加导致对漏洞保护的需求增加,这是由于决策者忽视了对攻击者或缺乏编写安全代码的技能和经验的软件开发人员的保护需求而增加的。结构化查询语言(SQL)注入、跨站脚本(XSS)、分布式拒绝服务(DDos)和可疑用户行为是web应用程序中一些常见的漏洞类型,攻击者可以通过这些漏洞泄露web应用程序的敏感信息,如信用卡号码和其他机密信息。本文提出了一种web威胁检测与预防框架(WTDPF),该框架通过研究攻击者在攻击过程中的行为,防止攻击者获取机密数据,并采取预防措施,以降低攻击的风险,减少恶意行为的后果。该框架由以下几个阶段组成:输入检查阶段、基于签名的动作组件阶段、警报和响应阶段。此外,该框架还具有日志记录功能,用于存储和跟踪正在发生的任何操作,并保存有关攻击者的IP地址、攻击日期和时间、攻击类型以及攻击者使用的机制的信息。此外,我们还提供了针对不同类型攻击的实验结果,并说明了所提出的框架在处理和防止恶意行为方面的成功。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Cooperative Cognitive Radio Spectrum Sensing Based on Correlation Sum Method with Linear Equalization ADS-B Reception Error Correction Based on the LSTM Neural-Network Model Why the Incoherent Paradigm is for the Future Wireless Networks? A Meta-Learning Approach for Aircraft Trajectory Prediction Analyses of Virtual MIMO Multi-User System Performance with Linear Precoding Schemes Using Indoor Measurements at 5 GHz
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1