Thread Rating:
  • 1 Votes - 5 Average
  • 1
  • 2
  • 3
  • 4
  • 5
PREVENTING DOS ATTAKCS USING PUZZLE AUCTION & IDENTIFYING SQL INJECTION
07-07-2014, 12:08 AM
#
PREVENTING DOS ATTAKCS USING PUZZLE AUCTION & IDENTIFYING SQL INJECTION
Internet services and applications have become an inextricable part of daily life, enabling communication and the management of personal information from anywhere. To accommodate this increase in application and data complexity, web services have moved to a multitiered design wherein the webserver runs the application front-end logic and data are outsourced to a database or file server.we propose DoubleGuard, an IDS system that models the network behavior of user sessions across both the front-end webserver and the back-end database. By monitoring both web and subsequent database requests, we are able to ferret out attacks that an independent IDS would not be able to identify. Furthermore, we quantify the limitations of any multitier IDS in terms of training sessions and functionality coverage. We implemented DoubleGuard using an Apache webserver with MySQL and lightweight virtualization. We then collected and processed real-world traffic over a 15-day period of system deployment in both dynamic and static web applications. Finally, using DoubleGuard, we were able to expose a wide range of attacks with 100 percent accuracy while maintaining 0 percent false positives for static web services and 0.6 percent false positives for dynamic web services.

EXISTING SYSTEM
A plethora of Intrusion Detection Systems (IDSs) currently examine network packets individually within both the webserver and the database system. However, there is very little work being performed on multitiered Anomaly Detection (AD) systems that generate models of network behavior for both web and database network interactions. In such multitiered architectures, the back-end database server is often protected behind a firewall while the webservers are remotely accessible over the Internet. Unfortunately, though they are protected from direct remote attacks, the back-end systems are susceptible to attacks that use web requests as a means to exploit the back end.
To protect multitiered web services, Intrusion detection systems have been widely used to detect known attacks by matching misused traffic patterns or signatures . A class of IDS that leverages machine learning can also detect unknown attacks by identifying abnormal network traffic that deviates from the so-called “normal” behavior previously profiled during the IDS training phase. Individually, the web IDS and the database IDS can detect abnormal network traffic sent to either of them. However, we found that these IDSs cannot detect cases wherein normal traffic is used to attack the webserver and the database server.

PROPOSED SYSTEM
We present DoubleGuard, a system used to detect attacks in multitiered web services. Our approach can create normality models of isolated user sessions that include both the web front-end (HTTP) and back-end (File or SQL) network transactions. To achieve this, we employ a light weight virtualization technique to assign each user’s web session to a dedicated container, an isolated virtual computing environment. We use the .Thus, DoubleGuard can build a causal mapping profile by taking both the webserver and DB traffic into account. Using our prototype, we show that, for websites that do not permit content modification from users, there is a direct causal relationship between the requests received by the front-end webserver and those generated for the database back end. In fact, we show that this causality-mapping model can be generated accurately and without prior knowledge of web application functionality. He we are implementing the concept of mixed cryptography for more confidentiality of the database.
 


Forum Jump:


User(s) browsing this thread:
1 Guest(s)

Return to TopReturn to Content