Reduction of SQL Injection & XSS Attacks Using IPAAS
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2013, Vol 6, Issue 5
Abstract
Network security is a main challenge now–a-days. There are different types of attacks in network. SQL Injection attacks are the most common attacks. Statistical survey says that most of the web sites which collaborate with the database are decumbent to SQL Injection or Cross Site scripting attacks. Detecting these attacks is known as anomaly detection. There is a lot anomoly detection techniques are widely used in a variety of applications, e.g., computer networks,security systems, etc. This paper describes and analyzes an approach to anomaly detection using proximity graphs and the PageRank algorithm. Most of the dynamic websites maintains databases; due to the design drawbacks of the database of a website there is a possibility of SQL injection attacks. The state-of-art web application input validation techniques fails to identify the proper SQL/XSS. The systems fail while processing HTTP parameter pollution attacks. Cross-site Scripting (XSS) has become prevalent type one of the most privacy vulnerabilities. Where the sake for the vulnerability primarily depends upon on the serverside, the normal exploitation is within the user’s web browser which was affected on the client-side by attacks. Therefore, an operator of a web application has evidence which was limited of XSS issues. IPAAS is not able to protect against all kind of XSS and SQL injection attacks. However, our experiments show that IPAAS is a simple and effective solution that can greatly improve the security of web applications. Our technique automatically and transparently applies input validates during the development phase of a web applications. Therefore, IPAAS helps developers that are unaware of web application security issues to write more secure applications.
Authors and Affiliations
Y. Rajalakshmi , Mrs D S Bhavani
Robust Watermarking Framework with DCT Based Encryption
Since several years,, the protection of multimedia data is becoming extremely important. The protection of the multimedia data might be performed with encryption or data hiding algorithms. To address the transmission tim...
MCA Learning Algorithm for Incident Signals Estimation:A Review
Recently there has been many works on adaptive subspace filtering in the signal processing literature. Most of them are concerned with tracking the signal subspace spanned by the eigenvectors corresponding to the eigenva...
A Literature Survey on Face Recognition Techniques
With data and information accumulating in abundance, there is a crucial need for high security. Biometrics has now received more attention. Face biometrics, useful for a person’s authentication is a simple and non-intrus...
Revival of Secure Top-k Multi-Keyword over Encrypted Cloud Data
Cloud computing has recently emerged as a new platform for deploying, managing, and provisioning large-scale services through an Internet-based infrastructure. However, concerns of sensitive information on cloud potentia...
PMA-Chord: Peer Mobility Adaptable Lookup for Chord Protocol
Structured Overlay Networks provide a promising system for high-performance applications because they may be fault-tolerant, scalable and self managing. Organized overlays provide lookup services that guide keys to nodes...