A Secure Methodology to Detect and Prevent Ddos and Sql Injection Attacks

Guardado en:
書目詳細資料
發表在:Turkish Journal of Computer and Mathematics Education vol. 12, no. 2 (2021), p. 341
主要作者: Leelavathy, S
其他作者: Jaichandran, R, Shobana, R, Bhaskaran, Sachin, Aravindh, Prathyunnan
出版:
Ninety Nine Publication
主題:
在線閱讀:Citation/Abstract
Full Text - PDF
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!

MARC

LEADER 00000nab a2200000uu 4500
001 2624698984
003 UK-CbPIL
022 |a 1309-4653 
035 |a 2624698984 
045 2 |b d20210101  |b d20211231 
100 1 |a Leelavathy, S  |u Department of Computer Science and engineering, Aarnpadai Veedu Institute of Technology, Vinayaka Missions Research Foundation (Deemed to be University), Paiyanoor, Tamil Nadu, India 
245 1 |a A Secure Methodology to Detect and Prevent Ddos and Sql Injection Attacks 
260 |b Ninety Nine Publication  |c 2021 
513 |a Journal Article 
520 3 |a As most of the applications host on cloud, Security is a major concern for the data owners. The cloud environment has to be secure and protect data owner data from cloud attacks. In this project work, we study about securing firewall against client side attacks namely Denial of firewall and SQL injection attacks. Denial of firewall is nothing but overloading the firewall by bursting n number of requests through vulnerable scripts. SQL injection attack is defined as bypassing the security protocols by malicious scripts. Thus we proposed to design and develop a web application to detect and prevent denial of firewall and SQL injection attacks. The denial of firewall attack can be performed using Java environment based servers and prevention can be performed using Digital Signature Algorithm (DSA) in which filter based approach and software puzzle based approach are performed to detect the malicious script based requests. Once the Deep Packet Inspection (DPI): filter based approach and software puzzle based approach are find satisfactory only the request would be processed. If the request is find malicious automatically the requested IP address would be blocked. Various type of SQL injection attacks namely SQL login bypass, Blind injection, SQL sleep attack, Data fetching attack are analysed and performed. The SQL injection attack can be prevented using PREPARE statements. This statements are created to make the SQL queries more efficient and render security benefits. This statement provides effective prevention mechanism against SQL injection attacks. Thus our proposed solution, provides high security against firewall attacks namely denial of firewall and SQL injection securing the data owner files and preventing compromising of firewall. 
653 |a Scripts 
653 |a Access control 
653 |a Software 
653 |a Algorithms 
653 |a Cryptography 
653 |a Inspection 
653 |a Digital signatures 
653 |a Applications programs 
653 |a Firewalls 
653 |a Prevention 
653 |a Query languages 
653 |a Computer Oriented Programs 
700 1 |a Jaichandran, R  |u Department of Computer Science and engineering, Aarnpadai Veedu Institute of Technology, Vinayaka Missions Research Foundation (Deemed to be University), Paiyanoor, Tamil Nadu, India 
700 1 |a Shobana, R  |u Department of Computer Science and engineering, Aarnpadai Veedu Institute of Technology, Vinayaka Missions Research Foundation (Deemed to be University), Paiyanoor, Tamil Nadu, India 
700 1 |a Bhaskaran, Sachin  |u Department of Computer Science and engineering, Aarnpadai Veedu Institute of Technology, Vinayaka Missions Research Foundation (Deemed to be University), Paiyanoor, Tamil Nadu, India 
700 1 |a Aravindh  |u Department of Computer Science and engineering, Aarnpadai Veedu Institute of Technology, Vinayaka Missions Research Foundation (Deemed to be University), Paiyanoor, Tamil Nadu, India 
700 1 |a Prathyunnan 
773 0 |t Turkish Journal of Computer and Mathematics Education  |g vol. 12, no. 2 (2021), p. 341 
786 0 |d ProQuest  |t Science Database 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/2624698984/abstract/embedded/ZKJTFFSVAI7CB62C?source=fedsrch 
856 4 0 |3 Full Text - PDF  |u https://www.proquest.com/docview/2624698984/fulltextPDF/embedded/ZKJTFFSVAI7CB62C?source=fedsrch