EAST: Exploitation of Attacks and System Threats in Network

In modern era, computer network is an emerging field. With the invention of powerful computer network concepts today we are able to share information with each other. We build complex systems so that user can use these systems with ease. But with this comes the question of security. There comes a question, is the data that we share safe? Complex systems built with the intent to use shared data for example such as social networking sites certainly have some security loopholes. The most important as well as the most difficult task of a developer is to ensure that whatever the situation be, the system is consistent. But, as a matter of fact, no developer can guarantee that. Systems do possess some vulnerabilities. In the work that follows, we have tried to explore some prevalent system vulnerabilities and network attacks. Using JAVA as a programming language we have shown the flaws/shinks in the Web Programming and successfully simulated the vulnerabilities and attacks and demonstrated encouraging results.

[1]  Oliver Popov,et al.  Root cause analysis of session management and broken authentication vulnerabilities , 2012, World Congress on Internet Security (WorldCIS-2012).

[2]  Pankaj Sharma,et al.  Integrated approach to prevent SQL injection attack and reflected cross site scripting attack , 2012, Int. J. Syst. Assur. Eng. Manag..

[3]  Rahul Johari,et al.  CAVEAT: Credit Card Vulnerability Exhibition and Authentication Tool , 2014, SSCC.

[4]  Marco Vieira,et al.  Evaluation of Web Security Mechanisms Using Vulnerability & Attack Injection , 2014, IEEE Transactions on Dependable and Secure Computing.

[5]  Mazdak Zamani,et al.  A Taxonomy of SQL Injection Detection and Prevention Techniques , 2013, 2013 International Conference on Informatics and Creative Multimedia.

[6]  Rahul Johari,et al.  A New Framework for Credit Card Transactions Involving Mutual Authentication between Cardholder and Merchant , 2011, 2011 International Conference on Communication Systems and Network Technologies.

[7]  William K. Robertson,et al.  Preventing Input Validation Vulnerabilities in Web Applications through Automated Type Analysis , 2012, 2012 IEEE 36th Annual Computer Software and Applications Conference.

[8]  Rahul Johari,et al.  Secure Query Processing in Delay Tolerant Network Using Java Cryptography Architecture , 2011, 2011 International Conference on Computational Intelligence and Communication Networks.

[9]  Rahul Johari,et al.  Sane : Secure Encryption Technique for Alphnumeric Data Over Web Based Applications , 2014 .

[10]  R. Johari,et al.  A Survey on Web Application Vulnerabilities (SQLIA, XSS) Exploitation and Security Engine for SQL Injection , 2012, 2012 International Conference on Communication Systems and Network Technologies.