Rishabh Jamar, Aditi Sogani, S. Mudgal, Yash Bhadra, Prathamesh P. Churi
{"title":"利用E-Shield作为IDPS工具防范网站攻击","authors":"Rishabh Jamar, Aditi Sogani, S. Mudgal, Yash Bhadra, Prathamesh P. Churi","doi":"10.1109/ICSCAN.2018.8541152","DOIUrl":null,"url":null,"abstract":"This paper holds the essence of preventing a system from attacks using honeypot integrated IDS in detail. Security breaches have soared high at an accelerating rate with the growing technological changes. Only detection cannot help solve the problem that the websites face. Eliminating the attacks is very paramount. The paper talks about how E-Shield (a system created to identify, intercept and eject the attacks) occuring on a website works. A system does not know whether the user is a good user or a bad user. A bad user, that is an attacker could harm the system, its resources, and misuse it in multiple ways. While there exist a variety of attacks, the paper focuses only on the 5 frequent attacks, besides listing all the major attributes of the user such as the source of attack, the status of the system’s security. Starting with the basic signup and logging in feature, to storing the credentials along with solving the intricacies related to it, to the ultimate step of preventing and avoiding the hazardous threat of data loss, all the system’s needs are catered to. The paper also discusses how the system tracks the user’s activities over a specified period of time and analyses and records them. Henceforth, leading to the betterment of cyber security, creating a pathway for online investments.","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Website Attack Prevention Using E-Shield as a IDPS Tool\",\"authors\":\"Rishabh Jamar, Aditi Sogani, S. Mudgal, Yash Bhadra, Prathamesh P. Churi\",\"doi\":\"10.1109/ICSCAN.2018.8541152\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper holds the essence of preventing a system from attacks using honeypot integrated IDS in detail. Security breaches have soared high at an accelerating rate with the growing technological changes. Only detection cannot help solve the problem that the websites face. Eliminating the attacks is very paramount. The paper talks about how E-Shield (a system created to identify, intercept and eject the attacks) occuring on a website works. A system does not know whether the user is a good user or a bad user. A bad user, that is an attacker could harm the system, its resources, and misuse it in multiple ways. While there exist a variety of attacks, the paper focuses only on the 5 frequent attacks, besides listing all the major attributes of the user such as the source of attack, the status of the system’s security. Starting with the basic signup and logging in feature, to storing the credentials along with solving the intricacies related to it, to the ultimate step of preventing and avoiding the hazardous threat of data loss, all the system’s needs are catered to. The paper also discusses how the system tracks the user’s activities over a specified period of time and analyses and records them. Henceforth, leading to the betterment of cyber security, creating a pathway for online investments.\",\"PeriodicalId\":378798,\"journal\":{\"name\":\"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)\",\"volume\":\"135 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSCAN.2018.8541152\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSCAN.2018.8541152","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Website Attack Prevention Using E-Shield as a IDPS Tool
This paper holds the essence of preventing a system from attacks using honeypot integrated IDS in detail. Security breaches have soared high at an accelerating rate with the growing technological changes. Only detection cannot help solve the problem that the websites face. Eliminating the attacks is very paramount. The paper talks about how E-Shield (a system created to identify, intercept and eject the attacks) occuring on a website works. A system does not know whether the user is a good user or a bad user. A bad user, that is an attacker could harm the system, its resources, and misuse it in multiple ways. While there exist a variety of attacks, the paper focuses only on the 5 frequent attacks, besides listing all the major attributes of the user such as the source of attack, the status of the system’s security. Starting with the basic signup and logging in feature, to storing the credentials along with solving the intricacies related to it, to the ultimate step of preventing and avoiding the hazardous threat of data loss, all the system’s needs are catered to. The paper also discusses how the system tracks the user’s activities over a specified period of time and analyses and records them. Henceforth, leading to the betterment of cyber security, creating a pathway for online investments.