Abstract The Internet can be defined as a global system of interconnected networks (wired/wireless) that use a Standard Internet Protocol Suite (Transmission Control Protocol/IP) to serve information worldwide. The client server architecture defines the way in which computing devices all over the world connect to the World Wide Web. In this architecture, the client requests some information from a web server through a web browser. The web server connects to a database server in turn to fetch data. The connection between the web server and the database is the one that needs to be well secured. This is where the role of secure authentication techniques comes into picture. Cyber-crimes are immoral actions that include illegal access of data, illegal interception of data, eavesdropping of unauthorized data over an information technology infrastructure, etc. There are various kinds of cyber-crimes such as Web attacks, Spam, Phishing Attacks, Information Warfare, Nigerian Scams, and DOS Attacks. At some or the other stage, most of these are ramifications of web attacks – an advanced prevention technique of which is explained in this paper. The proposed methodology utilizes a multi-tier mechanism to detect SQL attacks while maintaining the speed and user experience of the web application. The layered approach ensures that a genuine user would never feel that such a security mechanism was in place, while making it extremely difficult for intruders to break in.
[1]
Ronald L. Rivest,et al.
Introduction to Algorithms
,
1990
.
[2]
Bruce W. Weide,et al.
Using parse tree validation to prevent SQL injection attacks
,
2005,
SEM '05.
[3]
David M. Nicol,et al.
Simulating realistic network worm traffic for worm warning system design and testing
,
2003,
WORM '03.
[4]
Barak A. Pearlmutter,et al.
Detecting intrusions using system calls: alternative data models
,
1999,
Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[5]
Alessandro Orso,et al.
AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks
,
2005,
ASE.
[6]
Stephanie Forrest,et al.
A sense of self for Unix processes
,
1996,
Proceedings 1996 IEEE Symposium on Security and Privacy.
[7]
Leonid Portnoy,et al.
Intrusion detection with unlabeled data using clustering
,
2000
.
[8]
John Langford,et al.
CAPTCHA: Using Hard AI Problems for Security
,
2003,
EUROCRYPT.