Recent Attack Prevention Techniques in Web Service Applications

被引:0
|
作者
Bherde, Gajanan P. [1 ]
Pund, M. A. [2 ]
机构
[1] KJ Somaiya Coll Engn, Dept Comp Engn, Bombay, Maharashtra, India
[2] PRMIT&R, Dept Comp Sci & Engn, Badnera, Amravati, India
关键词
web applications; attack detection; attack prevention; web security; XML attack;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet security is very challenging task because internet is become very much essential part of human life. Most of the attacks are happen at application layer which causes the security of applications. Such internet based applications includes banking, defense, education, medicine etc, which require high level security. This paper explains basic types of attacks which harmful for web applications like, cross Site Scripting attack, cross site request forgery, SQL Injection Attack, Server Misconfiguration and Predictable Page, Breaking Authentication Schemes, Logic Attacks, Web of Distrust. Now a day, most of the application development is based on XML. This paper described XML based application attack including Xpatth injection, Xquery injection and XSS injection in details. We also make survey of various traditional and recent approaches to detect, prevent and remove the web application attacks. We compare these applications based on technique used to detect attack, which type of attack they resolve, to check the approach which dataset they used and finally provide the limitation of that system and respective future directions. This will helpful for researchers for further research in respective field.
引用
收藏
页码:1174 / 1180
页数:7
相关论文
共 50 条
  • [31] Guest editorial: web applications and techniques
    Wang, Wei
    Zhang, Wenjie
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2015, 18 (05): : 1391 - 1392
  • [32] Webshell Detection Techniques in Web Applications
    Truong Dinh Tu
    Cheng Guang
    Guo Xiaojun
    Pan Wubin
    2014 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT, 2014,
  • [33] Guest editorial: web applications and techniques
    Wei Wang
    Wenjie Zhang
    World Wide Web, 2015, 18 : 1391 - 1392
  • [34] A Proposal of Algorithm for Web Applications Cyber Attack Detection
    Kozik, Rafal
    Choras, Michal
    Renk, Rafal
    Holubowicz, Witold
    COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT, CISIM 2014, 2014, 8838 : 680 - 687
  • [35] An automated approach to generate Web applications attack scenarios
    Alata, Eric
    Kaaniche, Mohamed
    Nicomette, Vincent
    Akrout, Rim
    2013 SIXTH LATIN-AMERICAN SYMPOSIUM ON DEPENDABLE COMPUTING (LADC), 2013, : 78 - 85
  • [36] BlackWatch: Increasing Attack Awareness within Web Applications
    Hall, Calum C.
    Shepherd, Lynsay A.
    Coull, Natalie
    FUTURE INTERNET, 2019, 11 (02)
  • [37] A Review of Dynamic Web Service Composition Techniques
    D'Mello, Demian Antony
    Ananthanarayana, V. S.
    Salian, Supriya
    ADVANCED COMPUTING, PT III, 2011, 133 : 85 - +
  • [38] Dynamic Web Service Composition: Challenges and Techniques
    Sivasubramanian, S. Prasath
    Ilavarasan, E.
    Vadivelou, G.
    IAMA: 2009 INTERNATIONAL CONFERENCE ON INTELLIGENT AGENT & MULTI-AGENT SYSTEMS, 2009, : 131 - +
  • [39] Techniques of secure web service and its implementation
    Liu, MS
    Lu, JG
    Wang, SH
    Zhong, Q
    PROCEEDINGS OF 2005 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-9, 2005, : 161 - 164
  • [40] Web Service Composition: A Survey of Techniques and Tools
    Lemos, Angel Lagares
    Daniel, Florian
    Benatallah, Boualem
    ACM COMPUTING SURVEYS, 2015, 48 (03)