Intrusion Protection against SQL Injection and Cross Site Scripting Attacks Using a Reverse Proxy
نویسندگان
چکیده
SQL Injection attacks and Cross-Site Scripting attacks are the two most common attacks on web application. Proposed method is a new policy based Proxy Agent, which classifies the request as a scripted request, or query based request, and then, detects the respective type of attack, if any in the request. This method detects both SQL injection attack as well as the Cross-Site Scripting attacks. SQL injection vulnerabilities have been described as one of the most serious threats to the database driven applications. Web applications that are vulnerable to SQL injection may allow an attacker to gain complete access to their underlying databases. A SQL Injection Attack usually starts with identifying weaknesses in the applications where unchecked users’ input is transformed into database queries. Reverse Proxy is a technique which is used to sanitize the user’s inputs that may transform into a database attack. In this technique a filter program redirects the user’s input to the proxy server before it is sent to the application server. At the proxy server, data cleaning algorithm is triggered using a sanitizing application. Keywords— SQL Injection, SQL Attack, Data Sanitization, Database Security, Security Threats, Cross Site Scripting.
منابع مشابه
Reverse Proxy Framework using Sanitization Technique for Intrusion Prevention in Database
With the increasing importance of the internet in our day-to-day life, data security in web application has become very crucial. Ever increasing online and real time transaction services have led to manifold rise in the problems associated with the database security. Attacker uses illegal and unauthorized approaches to hijack the confidential information like username, password and other vital ...
متن کاملIntrusion Protection against SQL Injection Attacks Using a Reverse Proxy
In this era where Internet has captured the world, level of security that this Internet provides has not grown as fast as the Internet application. Internet has eased the life of human in numerous ways, but the drawbacks like the intrusions that are attached with the Internet applications sustains the growth of these applications. One such intrusion is the SQL Injection attacks (SQLIA). Since S...
متن کاملWeb Gladiator a Web Application Firewall
Application protection is a valuable security layer to protect against a number of application layer security threats which is usually not protected by a typical network layer intrusion detection system. The hackers will attack the Web Application using the methods like structured Query Language (SQL) Injection, Cross Site Scripting (XSS), Command Injection, cookie poisoning, etc. These problem...
متن کاملImplement Web Attack Detection Engine with Snort by Using Modsecurity Core Rules
In the Web 2.0 generation, network system faced the racket “Web attack”. Traditional network security devices like Firewall and Intrusion Detection System deal can hardly confront the threat of Web attacks since Hackers often use multi-level or multi-type encoding attack to evade Intrusion Detection Systems. The Intrusion Detection System usually uses the attack signature and Regular Expression...
متن کاملEnhanced Intrusion Detection System for Input Validation Attacks in Web Application
Internet continues to expand exponentially and access to the Internet become more prevalent in our daily life but at the same time web application are becoming most attractive targets for hacker and cyber criminals. This paper presents an enhanced intrusion detection system approach for detecting input validation attacks in the web application. The existing IDS for Input validation attacks are ...
متن کامل