利用E-Shield作为IDPS工具防范网站攻击

Rishabh Jamar, Aditi Sogani, S. Mudgal, Yash Bhadra, Prathamesh P. Churi
{"title":"利用E-Shield作为IDPS工具防范网站攻击","authors":"Rishabh Jamar, Aditi Sogani, S. Mudgal, Yash Bhadra, Prathamesh P. Churi","doi":"10.1109/ICSCAN.2018.8541152","DOIUrl":null,"url":null,"abstract":"This paper holds the essence of preventing a system from attacks using honeypot integrated IDS in detail. Security breaches have soared high at an accelerating rate with the growing technological changes. Only detection cannot help solve the problem that the websites face. Eliminating the attacks is very paramount. The paper talks about how E-Shield (a system created to identify, intercept and eject the attacks) occuring on a website works. A system does not know whether the user is a good user or a bad user. A bad user, that is an attacker could harm the system, its resources, and misuse it in multiple ways. While there exist a variety of attacks, the paper focuses only on the 5 frequent attacks, besides listing all the major attributes of the user such as the source of attack, the status of the system’s security. Starting with the basic signup and logging in feature, to storing the credentials along with solving the intricacies related to it, to the ultimate step of preventing and avoiding the hazardous threat of data loss, all the system’s needs are catered to. The paper also discusses how the system tracks the user’s activities over a specified period of time and analyses and records them. Henceforth, leading to the betterment of cyber security, creating a pathway for online investments.","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Website Attack Prevention Using E-Shield as a IDPS Tool\",\"authors\":\"Rishabh Jamar, Aditi Sogani, S. Mudgal, Yash Bhadra, Prathamesh P. Churi\",\"doi\":\"10.1109/ICSCAN.2018.8541152\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper holds the essence of preventing a system from attacks using honeypot integrated IDS in detail. Security breaches have soared high at an accelerating rate with the growing technological changes. Only detection cannot help solve the problem that the websites face. Eliminating the attacks is very paramount. The paper talks about how E-Shield (a system created to identify, intercept and eject the attacks) occuring on a website works. A system does not know whether the user is a good user or a bad user. A bad user, that is an attacker could harm the system, its resources, and misuse it in multiple ways. While there exist a variety of attacks, the paper focuses only on the 5 frequent attacks, besides listing all the major attributes of the user such as the source of attack, the status of the system’s security. Starting with the basic signup and logging in feature, to storing the credentials along with solving the intricacies related to it, to the ultimate step of preventing and avoiding the hazardous threat of data loss, all the system’s needs are catered to. The paper also discusses how the system tracks the user’s activities over a specified period of time and analyses and records them. Henceforth, leading to the betterment of cyber security, creating a pathway for online investments.\",\"PeriodicalId\":378798,\"journal\":{\"name\":\"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)\",\"volume\":\"135 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSCAN.2018.8541152\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSCAN.2018.8541152","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

本文详细阐述了利用蜜罐集成入侵防御系统攻击的本质。随着技术变革的不断发展,安全漏洞以更快的速度飙升。只有检测并不能帮助解决网站所面临的问题。消除攻击是至关重要的。这篇论文讨论了E-Shield(一种用于识别、拦截和驱逐攻击的系统)是如何在网站上工作的。系统不知道用户是好用户还是坏用户。不良用户(即攻击者)可能以多种方式损害系统及其资源并滥用系统。虽然存在各种各样的攻击,但本文除了列出攻击源、系统安全状态等用户的所有主要属性外,只关注5种频繁的攻击。从基本的注册和登录功能开始,到存储凭据以及解决与之相关的复杂问题,再到防止和避免数据丢失的危险威胁的最终步骤,满足了系统的所有需求。本文还讨论了系统如何在指定的时间段内跟踪用户的活动,并对其进行分析和记录。从此,导致网络安全的改善,为在线投资创造了一条途径。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Website Attack Prevention Using E-Shield as a IDPS Tool
This paper holds the essence of preventing a system from attacks using honeypot integrated IDS in detail. Security breaches have soared high at an accelerating rate with the growing technological changes. Only detection cannot help solve the problem that the websites face. Eliminating the attacks is very paramount. The paper talks about how E-Shield (a system created to identify, intercept and eject the attacks) occuring on a website works. A system does not know whether the user is a good user or a bad user. A bad user, that is an attacker could harm the system, its resources, and misuse it in multiple ways. While there exist a variety of attacks, the paper focuses only on the 5 frequent attacks, besides listing all the major attributes of the user such as the source of attack, the status of the system’s security. Starting with the basic signup and logging in feature, to storing the credentials along with solving the intricacies related to it, to the ultimate step of preventing and avoiding the hazardous threat of data loss, all the system’s needs are catered to. The paper also discusses how the system tracks the user’s activities over a specified period of time and analyses and records them. Henceforth, leading to the betterment of cyber security, creating a pathway for online investments.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
An Improvised Algorithm For Computer Vision Based Cashew Grading System Using Deep CNN Fuzzy Based Active Filter For Power Quality Mitigation Access Level Privacy Protection for Security ANALYSING TWO DIMENSIONAL PROGRESSION OF CRACKS IN BUILDINGS USING SOFTWARE A Survey report of the firefighters on fire hazards of PV fire
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1