Osama Rababah, A. K. Hwaitat, S. Manaseer, H. Fakhouri, R. Halaseh
{"title":"Web Threats Detection and Prevention Framework","authors":"Osama Rababah, A. K. Hwaitat, S. Manaseer, H. Fakhouri, R. Halaseh","doi":"10.4236/cn.2016.83017","DOIUrl":null,"url":null,"abstract":"The rapid advancement in technology and the increased number of web applications with very \nshort turnaround time caused an increased need for protection from vulnerabilities that grew due \nto decision makers overlooking the need to be protected from attackers or software developers \nlacking the skills and experience in writing secure code. Structured Query Language (SQL) Injection, \ncross-site scripting (XSS), Distributed Denial of service (DDos) and suspicious user behaviour \nare some of the common types of vulnerabilities in web applications by which the attacker can \ndisclose the web application sensitive information such as credit card numbers and other confidential \ninformation. This paper proposes a framework for the detection and prevention of web \nthreats (WTDPF) which is based on preventing the attacker from gaining access to confidential \ndata by studying his behavior during the action of attack and taking preventive measures to reduce \nthe risks of the attack and as well reduce the consequences of such malicious action. The \nframework consists of phases which begin with the input checking phase, signature based action \ncomponent phase, alert and response phases. Additionally, the framework has a logging functionality \nto store and keep track of any action taking place and as well preserving information about \nthe attacker IP address, date and time of the attack, type of the attack, and the mechanism the attacker \nused. Moreover, we provide experimental results for different kinds of attacks, and we illustrate \nthe success of the proposed framework for dealing with and preventing malicious actions.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"439 1","pages":"170-178"},"PeriodicalIF":0.0000,"publicationDate":"2016-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4236/cn.2016.83017","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9
Abstract
The rapid advancement in technology and the increased number of web applications with very
short turnaround time caused an increased need for protection from vulnerabilities that grew due
to decision makers overlooking the need to be protected from attackers or software developers
lacking the skills and experience in writing secure code. Structured Query Language (SQL) Injection,
cross-site scripting (XSS), Distributed Denial of service (DDos) and suspicious user behaviour
are some of the common types of vulnerabilities in web applications by which the attacker can
disclose the web application sensitive information such as credit card numbers and other confidential
information. This paper proposes a framework for the detection and prevention of web
threats (WTDPF) which is based on preventing the attacker from gaining access to confidential
data by studying his behavior during the action of attack and taking preventive measures to reduce
the risks of the attack and as well reduce the consequences of such malicious action. The
framework consists of phases which begin with the input checking phase, signature based action
component phase, alert and response phases. Additionally, the framework has a logging functionality
to store and keep track of any action taking place and as well preserving information about
the attacker IP address, date and time of the attack, type of the attack, and the mechanism the attacker
used. Moreover, we provide experimental results for different kinds of attacks, and we illustrate
the success of the proposed framework for dealing with and preventing malicious actions.