We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

WebGuard: Enhancing Intrusion Detection in Multi-tier Web Applications

by Asha U. Patil, Arati M. Dixit
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 95 - Number 9
Year of Publication: 2014
Authors: Asha U. Patil, Arati M. Dixit
10.5120/16624-6477

Asha U. Patil, Arati M. Dixit . WebGuard: Enhancing Intrusion Detection in Multi-tier Web Applications. International Journal of Computer Applications. 95, 9 ( June 2014), 29-35. DOI=10.5120/16624-6477

@article{ 10.5120/16624-6477,
author = { Asha U. Patil, Arati M. Dixit },
title = { WebGuard: Enhancing Intrusion Detection in Multi-tier Web Applications },
journal = { International Journal of Computer Applications },
issue_date = { June 2014 },
volume = { 95 },
number = { 9 },
month = { June },
year = { 2014 },
issn = { 0975-8887 },
pages = { 29-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume95/number9/16624-6477/ },
doi = { 10.5120/16624-6477 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:19:01.625109+05:30
%A Asha U. Patil
%A Arati M. Dixit
%T WebGuard: Enhancing Intrusion Detection in Multi-tier Web Applications
%J International Journal of Computer Applications
%@ 0975-8887
%V 95
%N 9
%P 29-35
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In today's world web applications and internet services have become an integral part of daily life, enabling communication and the management of personal information from anywhere. In order to accommodate humungous increase in demand and data complexity, web applications are moved to multitier design. With the increase in popularity of web applications, these applications also become target of various attacks. To protect multitier web applications several intrusion detection systems (IDS) have been proposed. This paper focuses on development of WebGuard – designed to deploy the IDS at the front end web server as well as the back end data base server. WebGuard generates the containers for isolating user sessions using virtualization technique. This strategy mainly focuses on detecting SQL Injection, Privilege Escalation, Session Hijacking, Direct DB and Cross Site Scripting (XSS) Attacks in multi-tier web applications by using a pattern mapping algorithm. This paper also proposes a preventive system to secure web applications from XSS attacks.

References
  1. Meixing Le, Angelos Stavrou, Brent Byoung Hoon Kang , "Double Guard : Detecting Intrusion in Multitier Web Applications", IEEE Transactions on dependable and secure computing volume 9, no 4, July/August 2012.
  2. M. Jons, B Engelmann, and J. Posegga, "XSSDS : Server-side Detection of Cross-site Scripting Attacks",Computer Security Applications Conference,2008 ACSAC 2008, Annual IEEE,pp 335-344,2008.
  3. A. Klein "Dom based cross site scripting or XSS of the third kind", Web Application Security Consortium, Articles, Vol. 4, 2005
  4. Anely. "Advanced injection in server applications", Technical report, Next Generation Security Software, Ltd,2002
  5. E. Kirda, C. Kruegel,G Vigna, and N. Jovanovic "Noxes : A Client side solution for Mitigating Cross-Site Scripting Attacks", Dijon France SAC' ACM 06 April 2006.
  6. A. K. Ganame, J. Bidou, F. Spies, "A Global Security Architecture for intrusion on Computer Networks", Montbeliard Volume 27, March 2008
  7. G. W. Dunlap, S. T. King, S. Cinar, M Basrai, "Enabling intrusion analysis through virtual-machine logging and reply", Boston, MA, USA, December2002
  8. http:// www. san. org/top-cyber-security-risk/
  9. A. Stock, J. Williams, and D. Wichers, OWASP TOP 10, OWASP Foundation 2013.
  10. Chiristoper Kruegel, G. Vigna, William Robertson, "A mutimode- approach to the detection of web-based attacks", Computer Networks 48 ELSEVIER pp. 717-738. 2005.
  11. P. Vogt,F Nentwich, N Jovanovic,C Kruegel,E. Kirda and G vigna. "Cross site scripting prevention with dynamic data taining and static analysis", 14th Annual network and Distributed System Security Symposium (ndss),2007.
  12. E. Gal an A. Alcaide A. Orfila, J blasco, "A multi-agent scanner to detect stored XSS vulnerabilities", IEEE International Conference on Internet Technology and Secure Transactions (ICITST)JUNE 2010
  13. M. James Stephen P. V. G. D. Prasad Reddy, ch Demudu Naidu, "Prevention of cross site Scripting with E-guard Algorithm", International Journal of Computer Application Volume22- No5 May2011.
  14. Y. Huang, A. Stavrou, A. K. Ghosh, and S. J ajodia. "Efficiently tracking application interactions using lightweight virtualization". In Proceedings of the 1st ACM workshop on Virtual machine security, 2008
  15. Y. Hu and B. Panda. "A data mining approach for database intrusion detection". In H. Haddad, A. Omicini, R. L. Wainwright, and L. M. Liebrock, editors, SAC. ACM, 2004.
  16. Liang and Sekar. "Fast and automated generation of attack signatures: A basis for building self-protecting servers", In SIGSAC: 12th ACM Conference on Computer and Communications Security, 2005.
  17. Yi Xie and Shun-Zheng Yu, "A Large-Scale Hidden Semi-Markov Model for Anomaly Detection on User Browsing Behaviors", IEEE/ACM transactions on networking, vol. 17, no. 1, February 2009
  18. XSS Attack Vectors at http://ha. ckers. org/xss. html
  19. Bates, D. , Barth, A. , and Jackson, C. "Regular expressions considered harmful in client-side XSS In WWW", Proceedings of the 19th international conference on World wide web (New York, NY, USA, 2010), ACM,.
  20. A S Yeole, B B Meshram, "Analysis of Different Technique for Detection of Injection", International Conference and Workshop on Emerging Trends in Technology (ICWET 2011) – TCET, Mumbai, India,ACM
  21. T. Lane and C. E. Brodley. "Temporal sequence learning and data reduction for anomaly detection". In Proceedings of the 5th ACM conference on Computer and communications security, pages 150 to158. ACM Press, 1998.
  22. http://www. snort. org
  23. C. Kruegel and G. Vigna "Anomaly detection of web-based attacks", In Proceedings of the 10th ACM Conference on Computer and Communication Security (CCS '03), Washington,DC, Oct. 2003. ACM Press.
  24. G. Vigna, W. K. Robertson, V. Kher, and R. A. Kemmerer. "A stateful intrusion detection system for world-wide web servers",In ACSAC 2003. IEEE Computer Society.
  25. M. Cova, D. Balzarotti, V. Felmetsger, and G. Vigna. "Swaddler: An Approach for the Anomaly-based Detection of State Violations in WebApplications", In RAID 2007.
  26. Andreas Kind, Marc Ph. Stoecklin, and Xenofontas Dimitropoulos "Histogram-Based Traffic Anomaly Detection" IEEE transactions on network service management, vol. 6, no. 2,June 2009.
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion Detection System Pattern Mapping Virtualization.