Recent Attack Prevention Techniques in Web Service Applications

被引:0
作者
Bherde, Gajanan P. [1 ]
Pund, M. A. [2 ]
机构
[1] KJ Somaiya Coll Engn, Dept Comp Engn, Bombay, Maharashtra, India
[2] PRMIT&R, Dept Comp Sci & Engn, Badnera, Amravati, India
来源
2016 INTERNATIONAL CONFERENCE ON AUTOMATIC CONTROL AND DYNAMIC OPTIMIZATION TECHNIQUES (ICACDOT) | 2016年
关键词
web applications; attack detection; attack prevention; web security; XML attack;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet security is very challenging task because internet is become very much essential part of human life. Most of the attacks are happen at application layer which causes the security of applications. Such internet based applications includes banking, defense, education, medicine etc, which require high level security. This paper explains basic types of attacks which harmful for web applications like, cross Site Scripting attack, cross site request forgery, SQL Injection Attack, Server Misconfiguration and Predictable Page, Breaking Authentication Schemes, Logic Attacks, Web of Distrust. Now a day, most of the application development is based on XML. This paper described XML based application attack including Xpatth injection, Xquery injection and XSS injection in details. We also make survey of various traditional and recent approaches to detect, prevent and remove the web application attacks. We compare these applications based on technique used to detect attack, which type of attack they resolve, to check the approach which dataset they used and finally provide the limitation of that system and respective future directions. This will helpful for researchers for further research in respective field.
引用
收藏
页码:1174 / 1180
页数:7
相关论文
共 15 条
[1]  
Alosefer Y., 2011, 2011 7th International Conference on Next Generation Web Services Practices, P31, DOI 10.1109/NWeSP.2011.6088149
[2]  
Chan GY, 2015, 2015 12TH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (FSKD), P524, DOI 10.1109/FSKD.2015.7381997
[3]  
Hammarberg D., 2014, BEST DEFENSES ZERO D
[4]   CRAXweb: Automatic Web Application Testing and Attack Generation [J].
Huang, Shih-Kun ;
Lu, Han-Lin ;
Leong, Wai-Meng ;
Liu, Huan .
2013 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY (SERE), 2013, :208-217
[5]  
Kesharwani Swati Ramesh, 2012, INT J SCI RES IJSR, P2319
[6]  
Kumar A, 2015, 2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), P1734, DOI 10.1109/ICACCI.2015.7275864
[7]  
Mohantly M.S., 2008, Monetary Policy Transmission in Emerging Market Economies: What is New?, P1
[8]   Joza: Hybrid Taint Inference for Defeating Web Application SQL Injection Attacks [J].
Naderi-Afooshteh, Abbas ;
Anh Nguyen-Tuong ;
Bagheri-Marzijarani, Mandana ;
Hiser, Jason D. ;
Davidson, Jack W. .
2015 45TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, 2015, :172-183
[9]   Web Server Protection against Application Layer DDoS Attacks using Machine Learning and Traffic Authentication [J].
Ndibwile, Jema David ;
Govardhan, A. ;
Okada, Kazuya ;
Kadobayashi, Youki .
IEEE 39TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC 2015), VOL 3, 2015, :261-267
[10]  
Pandiaraja P., 2015, IEEE INT C CIRC POW