Reduction of SQL Injection & XSS Attacks Using IPAAS
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2013, Vol 6, Issue 5
Abstract
Network security is a main challenge now–a-days. There are different types of attacks in network. SQL Injection attacks are the most common attacks. Statistical survey says that most of the web sites which collaborate with the database are decumbent to SQL Injection or Cross Site scripting attacks. Detecting these attacks is known as anomaly detection. There is a lot anomoly detection techniques are widely used in a variety of applications, e.g., computer networks,security systems, etc. This paper describes and analyzes an approach to anomaly detection using proximity graphs and the PageRank algorithm. Most of the dynamic websites maintains databases; due to the design drawbacks of the database of a website there is a possibility of SQL injection attacks. The state-of-art web application input validation techniques fails to identify the proper SQL/XSS. The systems fail while processing HTTP parameter pollution attacks. Cross-site Scripting (XSS) has become prevalent type one of the most privacy vulnerabilities. Where the sake for the vulnerability primarily depends upon on the serverside, the normal exploitation is within the user’s web browser which was affected on the client-side by attacks. Therefore, an operator of a web application has evidence which was limited of XSS issues. IPAAS is not able to protect against all kind of XSS and SQL injection attacks. However, our experiments show that IPAAS is a simple and effective solution that can greatly improve the security of web applications. Our technique automatically and transparently applies input validates during the development phase of a web applications. Therefore, IPAAS helps developers that are unaware of web application security issues to write more secure applications.
Authors and Affiliations
Y. Rajalakshmi , Mrs D S Bhavani
Detecting and Localizing the Attackers in Multiple Networks
Spoofing attack which easily attack the network and reduce the performance of the network. In this Paper, Spoofing attacks are detected, Finding the number of attackers that masquerade the node identity, Localizing all t...
VHDL Modeling of Intrusion Detection & Prevention System (IDPS) – A Neural Network Approach
The rapid development and expansion of World Wide Web and network systems have changed the computing world in the last decade and also equipped the intruders and hackers with new facilities for their destructive purposes...
A survey on Human Computer Interaction Mechanism Using Finger Tracking
Human Computer Interaction (HCI) is a field in which developer makes a user friendly system. User can interact with a computer system without using any conventional peripheral devices. Marker is used to recognize hand mo...
High Throughput and Less Area AMP Architecture for Audio Signal Restoration
Audio restoration is effectively achieved by using low complexity algorithm called AMP. This algorithm has fast convergence and has lower computation intensity making it suitable for audio recovery problems. This paper f...
Design an Algorithm for Data Encryption and Decryption Using Pentaoctagesimal SNS
Encryption is the most effective way of computer science concerned with developing schemes and formula to achieve data and information security through the use of codes. Today the privacy is the main issue to sending inf...