Website Security for Detection and Prevention of Attacks

Ajit Yadav *, Rahul Yadav **, Mangesh Tiwari***
*-*** Department of Information Technology, Shree L. R. Tiwari College of Engineering, Mira Bhayandar, Maharashtra, India.
Periodicity:January - March'2020
DOI : https://doi.org/10.26634/jse.14.3.17360

Abstract

The internet usage increases every day, shrinking the world to come closer and making it a smaller place for its users to live. However, this increase in usage has created problems for the users with the increase in cyber-crimes. This, therefore, has induced a need for monitoring and analyzing system activities by users and has enforced tracking and blocking malwares. This is where Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) comes into the picture. IDS and IPS have a substantial impact on the society in reducing the number of cyber-crimes. This provides a platform to facilitate basic security amenities for small and medium enterprises and emerging entrepreneurs. Intrusion prevention systems generally include methodologies like analyzing signatures, statistical anomalies and fingerprints. These methods detect malwares and further actions are taken to block the malware. IPS techniques differ on how they scan the data streams to detect a threat or intrusion. Research community to studies network security issues by data capture and data control, such as internet worms, spam control, and Denial of Service (DoS) attacks. This paper will be focusing on detection and prevention cyber of attacks on websites.

Keywords

Web Security, Intrusion Detection System (IDS), Intrusion Prevention System (IPS); Security; Denial of Service (DoS).

How to Cite this Article?

Yadav, A., Yadav, R., and Tiwari, M.(2020). Website Security for Detection and Prevention of Attacks. i-manager's Journal on Software Engineering, 14(3), 37-41. https://doi.org/10.26634/jse.14.3.17360

References

[1]. Christen, P. (2011). A survey of indexing techniques for scalable record linkage and deduplication. IEEE Transactions on Knowledge and Data Engineering, 24(9), 1537-1555.
[2]. Gupta, M. K., Govil, M. C., & Singh, G. (2015). Predicting Cross-Site Scripting (XSS) security vulnerabilities in web applications. In 2015, 12th International Joint Conference on Computer Science and Software Engineering (JCSSE) (pp. 162-167). IEEE.
[3]. Gupta, P. V. N. (2013). Fingerprint based Student Attendance system using GSM. International Journal of Science and Research (IJSR), 2(10), 2319-7064.
[4]. Ihmaidi, H. D., Al-Jaber, A., & Hudaib, A. (2006). Securing online shopping using biometric personal authentication and steganography. In 2006, 2nd International Conference on Information & Communication Technologies (Vol. 1, pp. 233-238). IEEE.
[5]. Ilugbusi, A. A., & Adetunmbi, O. A. (2017). Development of a multi-intance fingerprint based authentication system. In 2017, International Conference on Computing Networking and Informatics (ICCNI) (pp. 1- 9). IEEE.
[6]. Khari, M., & Sangwan, P. (2016). Web-application attacks: A survey. In 2016, 3rd International Conference on Computing for Sustainable Global Development (INDIACom) (pp. 2187-2191). IEEE.
[7]. Nagpal, B., Chauhan, N., & Singh, N. (2017). SECSIX: Security engine for CSRF, SQL injection and XSS attacks. International Journal of System Assurance Engineering and Management, 8(2), 631-644. https://doi.org/10. 1007/s13198-016-0489-0
[8]. Panda, S., & Ramani, S. (2013). Protection of web application against SQL injection attacks. International Journal of Modern Engineering Research (IJMER), 3(1), 166-168.
[9]. Spafford, E. H. (n.d.). Quotable Spaf. Retrieved from https://spaf.cerias.purdue.edu/quotes.html
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.