logo

Threat Detection Technique

   

Added on  2022-11-18

6 Pages1177 Words99 Views
Running head: THREAT DETECTION TECHNIQUE
THREAT DETECTION TECHNIQUE
Name of the Student:
Name of the University
Author Note:

THREAT DETECTION TECHNIQUE1
Juel Abreu
“Prevention of techniques in web service application”
Maintaining the security of the web is an important concern and the significance of
maintaining the web service application is important in this context. In ever days life we use
the internet for doing different things like listening to music or paying bills through online
portal. It can be said that the out activities can be affected by the internet and the disrupted by
the web attacks. The main objective of this paper is based on the discussion done by authors
Gajanan P. Bherde and M.A. Punds. The discussion will cover some of the exploits of the
attacks like server misconfiguration, predictable page and injection attack. They have
discussed various types of attacks. These are the attacks those affect the internal system.
These attacks can have adverse effects like slowing the performance of the internet and
making the services and the resources unavailable to the users. Most of the users and the
organizations can detect the attack after occurring of the attack.
Various attacks have been mentioned in the discussion. The first type of attack
mentioned in this context is Cross Site Scripting XSS attack. According to Gajanan P. Bherde
and M.A. Punds the cross site scripting attack can be initialized as the intruder inject the
malicious client side script into the web pages along with the other plug-ins of the server. The
attackers will inject the malicious script to the target machine or the users. Through this kind
of attack, the intruders can access the information and the cookies from the webpage used by
the users. Another type of attack is Cross Site Request Forgery which is also known as
“known click” attack or “session riding”. In this type of attack the malicious codes and the
commends are passed to the users to the intruders. Apart from that the attackers can send the
link with the malicious code so that the users will click on that ink and their data will be
breached.

THREAT DETECTION TECHNIQUE2
Another type of attack discussed in this context is Structured Query Language
Injection (SQL Injection). According to Gajanan P. Bherde and M.A. Punds, the SQL Query
injection is used for attacking the database applications. This is the method that will help the
intruders to inject the corrupted code in the query of the database. Through this attack the
intruders can access the places in database those are normally restricted for the normal users.
Through this type of the attack, the attackers can modify and delete the data and information
from the web database whenever it is needed. The intruders can become harmful for both the
web application and the users using the web application. The attack can make the system and
the resources unavailable to the users that can generate the loss of million dollars. On the
other hand , another attack mentioned in this context is Server Misconfiguration and
Predictable page and these are more related to the vulnerability of the site and the lack of
security of the webpage. The target of this type of attack is generally the servers.
Other types of attacks those can be mentioned in this context are Breaking
Authentication Schemes, Logic Attacks and the web of Distrust. According to Gajanan P.
Bherde and M.A. Punds “Breaking Authentication” includes basic authentication, form based
authentication, and single sign-on authentication for the web application users. Through these
attacks the intruders can gain access to the unauthorized places. In case, if the intruders can
break into the web application they can change or modify the logics in the code of the web
page. Gajanan P. Bherde and M.A. Punds defines the logic attacks as development of the
logical application by the developers. However, this type of attacks are undetectable as the
lack of validation. Apart from that this type of attacks can become dangerous because the
intruders can change the sequence of the execution of the program. This type of attack is
harmful for the software and can become a threat for the system. Apart from that through the
Xpath injection, Xquery Injection and Xss Injection the intruders can add the malicious codes
in the software.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computing Technologies Assignment Report
|7
|1221
|30

Contemporary World Application 2022
|10
|541
|10

Ways of Attacking a Web Application in PHP: SQL Injection, XSS, Session Hijacking, Directory Traversal, and Remote File Inclusion
|9
|1493
|176

Information Security Threats and Mitigation Strategies for Nike
|17
|2930
|66

Cyber Security: Vulnerabilities, Exploitation, and Security Controls
|10
|2384
|453

System Security : Report
|13
|999
|347