CFP last date
20 January 2025
Reseach Article

Dual Safeguard: Intrusion Detection and Prevention System in Web Applications

by M. Sujitha, P. Suganya, T. Shampavi, S. Anjanaa
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 67 - Number 9
Year of Publication: 2013
Authors: M. Sujitha, P. Suganya, T. Shampavi, S. Anjanaa
10.5120/11421-6759

M. Sujitha, P. Suganya, T. Shampavi, S. Anjanaa . Dual Safeguard: Intrusion Detection and Prevention System in Web Applications. International Journal of Computer Applications. 67, 9 ( April 2013), 13-18. DOI=10.5120/11421-6759

@article{ 10.5120/11421-6759,
author = { M. Sujitha, P. Suganya, T. Shampavi, S. Anjanaa },
title = { Dual Safeguard: Intrusion Detection and Prevention System in Web Applications },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 67 },
number = { 9 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 13-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume67/number9/11421-6759/ },
doi = { 10.5120/11421-6759 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:24:12.316993+05:30
%A M. Sujitha
%A P. Suganya
%A T. Shampavi
%A S. Anjanaa
%T Dual Safeguard: Intrusion Detection and Prevention System in Web Applications
%J International Journal of Computer Applications
%@ 0975-8887
%V 67
%N 9
%P 13-18
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Web applications are the most universal way to make services and data accessible on the Internet. With the increase in the use of these applications, there has also been an increase in the amount and complexity of vulnerabilities and attacks. These attacks target directly the back-end database systems of the web application to achieve information. In this paper, a Dual Safeguard Intrusion Detection and Prevention System was proposed to models the user network behaviors and create normality models of isolated user sessions across both front-end and back-end of the application. To accomplish this, a Lightweight virtualization technique is used to allocate each user's web session to a dedicated container, providing an isolated virtual computing environment. An Intrusion Detection Model for web applications based on Hidden Markov Model was also proposed.

References
  1. M. Le, A. Stavrou and B. B. Kang, "DoubleGuard: Detecting Intrusions in Multitier Web Applications", IEEE Transactions On Dependable And Secure Computing, vol. 9, no. 4, July/August 2012
  2. K. Bai, H. Wang, and P. Liu, "Towards Database Firewalls," Proc. Ann. IFIP WG 11. 3 Working Conf. Data and Applications Security (DBSec '05), 2005.
  3. Y. Huang, A. Stavrou, A. K. Ghosh, and S. Jajodia, "Efficiently Tracking Application Interactions Using Lightweight Virtualization," Proc. First ACM Workshop Virtual Machine Security, 2008.
  4. R. Sekar, "An Efficient Black-Box Technique for Defeating Web Application Attacks," Proc. Network and Distributed System Security Symp. (NDSS), 2009.
  5. G. Vigna, F. Valeur, D. Balzarotti, W. K. Robertson, C. Kruegel, and E. Kirda, "Reducing Errors in the Anomaly-Based Detection of Web-Based Attacks through the Combined Analysis of Web Requests and SQL Queries," J. Computer Security, vol. 17, no. 3, pp. 305-329, 2009.
  6. SANS,"The Top Cyber Security Risks," http://www. sans. org/top-cyber-security-risks/, 2011.
  7. "Common Vulnerabilities and Exposures," http://www. cve. mitre. org/, 2011.
  8. "Five Common Web Application Vulnerabilities," http://www. symantec. com /connect/articles/five-common-web application vulnerabilities, 2011.
  9. Greensql, http://www. greensql. net/, 2011.
  10. Openvz, http://wiki. openvz. org, 2011.
  11. A. Schulman, "Top 10 Database Attacks," http://www. bcs. org/server. php, 2011.
  12. W. Robertson, F. Maggi, C. Kruegel, and G. Vigna, "Effective Anomaly Detection with Scarce Training Data," Proc. Network and Distributed System Security Symp. (NDSS), 2010.
  13. M. Roesch, "Snort, Intrusion Detection System," http://www. snort. org, 2011.
  14. B. Parno, J. M. McCune, D. Wendlandt, and A. Perrig, "CLAMP: Practical Prevention of Large-Scale Data Leaks," Proc. IEEE Symp. Security and Privacy, 2009.
Index Terms

Computer Science
Information Sciences

Keywords

IDS Multitier web application Normality model Hidden Markov Model Container Virtualization