A Defensive Application to Identify the Web Attacks Using Hadoop

نویسندگان

  • G. S S Pavani Prathyusha
  • S. Suhasini
  • A. Vijaya Banu
  • Vijaya Banu
چکیده

Web applications these days have increased dependency extending from people to large organizations. Along with the web-based application market growing fast, the data that is being communicated through the network is not secure. Attackers aim to attack a website or internet server by means of web application queries. Queries are created with the help of properly defined strings and parameters. These are registered in the web server log file. The proposed methodology identifies the basic web application security faults by investigating log records from the web server on Hadoop system. By investigating each record of server log file, the proposed technique recognizes the SQL Injection and Cross Site Scripting (XSS) attacks using Regular Expressions and Pattern Matching algorithms. The Regular Expressions are formed for each pattern of attacks using corresponding string characteristics of the attack. The Pattern list consists of an Anomaly Pattern list that is preserved for each attack. Then Pattern matcher matches, the server log entries to the Anomaly Pattern List. If the server logs pattern is accurately matched with any of the saved patterns in the Anomaly Pattern List then it is said that the Query gets affected by either SQL Injection or Cross Site Scripting attacks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism

Today, the use of the Internet and Internet sites has been an integrated part of the people’s lives, and most activities and important data are in the Internet websites. Thus, attempts to intrude into these websites have grown exponentially. Intrusion detection systems (IDS) of web attacks are an approach to protect users. But, these systems are suffering from such drawbacks as low accuracy in ...

متن کامل

Language-based Defenses Against Untrusted Browser Origins

We present new attacks and robust countermeasures for security-sensitive components, such as single sign-on APIs and client-side cryptographic libraries, that need to be safely deployed on untrusted web pages. We show how failing to isolate such components leaves them vulnerable to attacks both from the hosting website and other components running on the same page. These attacks are not prevent...

متن کامل

Analyzing new features of infected web content in detection of malicious web pages

Recent improvements in web standards and technologies enable the attackers to hide and obfuscate infectious codes with new methods and thus escaping the security filters. In this paper, we study the application of machine learning techniques in detecting malicious web pages. In order to detect malicious web pages, we propose and analyze a novel set of features including HTML, JavaScript (jQuery...

متن کامل

Memory DoS Attacks in Multi-tenant Clouds: Severity and Mitigation

Memory DoS attacks are Denial of Service (or Degradation of Service) attacks caused by contention for hardware memory resources. In cloud computing, these availability breaches are serious security threats that occur despite the strong memory isolation techniques for Virtual Machines (VMs), enforced by the software virtualization layer. The underlying hardware memory layers are still shared by ...

متن کامل

Traitor: Associating Concepts using the World Wide Web

We use Common Crawl’s 25TB data set of web pages to construct a database of associated concepts using Hadoop. The database can be queried through a web application with two query interfaces. A textual interface allows searching for similarities and differences between multiple concepts using a query language similar to set notation, and a graphical interface allows users to visualize similarity...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017