Visible to the public Towards Improving Web Attack Detection: Highlighting the Significant Factors

TitleTowards Improving Web Attack Detection: Highlighting the Significant Factors
Publication TypeConference Paper
Year of Publication2015
AuthorsWazzan, M. A., Awadh, M. H.
Conference Name2015 5th International Conference on IT Convergence and Security (ICITCS)
Date PublishedAug. 2015
PublisherIEEE
ISBN Number978-1-4673-6537-6
Keywordsbroken authentication, Buffer overflows, Computer crime, cross-site scripting, cyber attack, data protection, denial of service attack, e-business, hackers, information access, Information management, injection, Internet, Intrusion detection, IP networks, Monitoring, pubcrawl170109, session management, Uniform resource locators, Web application protection, Web Application Security, Web application vulnerabilities, Web attack detection, XSS
Abstract

Nowadays, with the rapid development of Internet, the use of Web is increasing and the Web applications have become a substantial part of people's daily life (e.g. E-Government, E-Health and E-Learning), as they permit to seamlessly access and manage information. The main security concern for e-business is Web application security. Web applications have many vulnerabilities such as Injection, Broken Authentication and Session Management, and Cross-site scripting (XSS). Subsequently, web applications have become targets of hackers, and a lot of cyber attack began to emerge in order to block the services of these Web applications (Denial of Service Attach). Developers are not aware of these vulnerabilities and have no enough time to secure their applications. Therefore, there is a significant need to study and improve attack detection for web applications through determining the most significant factors for detection. To the best of our knowledge, there is not any research that summarizes the influent factors of detection web attacks. In this paper, the author studies state-of-the-art techniques and research related to web attack detection: the author analyses and compares different methods of web attack detections and summarizes the most important factors for Web attack detection independent of the type of vulnerabilities. At the end, the author gives recommendation to build a framework for web application protection.

URLhttps://ieeexplore.ieee.org/document/7293028
DOI10.1109/ICITCS.2015.7293028
Citation Keywazzan_towards_2015