Juel Abreu: Threat Detection Techniques in Web Service Applications
VerifiedAdded on 2022/11/18
|6
|1177
|99
Report
AI Summary
This report, authored by Juel Abreu, focuses on threat detection techniques in web service applications, drawing upon the work of Gajanan P. Bherde and M.A. Punds. The paper examines various web attacks, including Cross-Site Scripting (XSS), Cross-Site Request Forgery, Structured Query Language Injection (SQL Injection), server misconfiguration, predictable pages, breaking authentication schemes, logic attacks, and the web of distrust. It details the impact of these attacks, such as performance slowdowns, service unavailability, and data breaches. The report further discusses prevention and detection techniques, including signature-based detection, knowledge-based detection, statistical-based detection, behavior detection, and hybrid-based detection. It emphasizes the importance of proactive measures to protect web applications and their users from malicious activities, highlighting the need for robust security practices to mitigate potential threats and ensure system integrity. The report also references the importance of understanding the vulnerabilities of the site and the lack of security of the webpage.

Running head: THREAT DETECTION TECHNIQUE
THREAT DETECTION TECHNIQUE
Name of the Student:
Name of the University
Author Note:
THREAT DETECTION TECHNIQUE
Name of the Student:
Name of the University
Author Note:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1THREAT DETECTION TECHNIQUE
Juel Abreu
“Prevention of techniques in web service application”
Maintaining the security of the web is an important concern and the significance of
maintaining the web service application is important in this context. In ever days life we use
the internet for doing different things like listening to music or paying bills through online
portal. It can be said that the out activities can be affected by the internet and the disrupted by
the web attacks. The main objective of this paper is based on the discussion done by authors
Gajanan P. Bherde and M.A. Punds. The discussion will cover some of the exploits of the
attacks like server misconfiguration, predictable page and injection attack. They have
discussed various types of attacks. These are the attacks those affect the internal system.
These attacks can have adverse effects like slowing the performance of the internet and
making the services and the resources unavailable to the users. Most of the users and the
organizations can detect the attack after occurring of the attack.
Various attacks have been mentioned in the discussion. The first type of attack
mentioned in this context is Cross Site Scripting XSS attack. According to Gajanan P. Bherde
and M.A. Punds the cross site scripting attack can be initialized as the intruder inject the
malicious client side script into the web pages along with the other plug-ins of the server. The
attackers will inject the malicious script to the target machine or the users. Through this kind
of attack, the intruders can access the information and the cookies from the webpage used by
the users. Another type of attack is Cross Site Request Forgery which is also known as
“known click” attack or “session riding”. In this type of attack the malicious codes and the
commends are passed to the users to the intruders. Apart from that the attackers can send the
link with the malicious code so that the users will click on that ink and their data will be
breached.
Juel Abreu
“Prevention of techniques in web service application”
Maintaining the security of the web is an important concern and the significance of
maintaining the web service application is important in this context. In ever days life we use
the internet for doing different things like listening to music or paying bills through online
portal. It can be said that the out activities can be affected by the internet and the disrupted by
the web attacks. The main objective of this paper is based on the discussion done by authors
Gajanan P. Bherde and M.A. Punds. The discussion will cover some of the exploits of the
attacks like server misconfiguration, predictable page and injection attack. They have
discussed various types of attacks. These are the attacks those affect the internal system.
These attacks can have adverse effects like slowing the performance of the internet and
making the services and the resources unavailable to the users. Most of the users and the
organizations can detect the attack after occurring of the attack.
Various attacks have been mentioned in the discussion. The first type of attack
mentioned in this context is Cross Site Scripting XSS attack. According to Gajanan P. Bherde
and M.A. Punds the cross site scripting attack can be initialized as the intruder inject the
malicious client side script into the web pages along with the other plug-ins of the server. The
attackers will inject the malicious script to the target machine or the users. Through this kind
of attack, the intruders can access the information and the cookies from the webpage used by
the users. Another type of attack is Cross Site Request Forgery which is also known as
“known click” attack or “session riding”. In this type of attack the malicious codes and the
commends are passed to the users to the intruders. Apart from that the attackers can send the
link with the malicious code so that the users will click on that ink and their data will be
breached.

2THREAT DETECTION TECHNIQUE
Another type of attack discussed in this context is Structured Query Language
Injection (SQL Injection). According to Gajanan P. Bherde and M.A. Punds, the SQL Query
injection is used for attacking the database applications. This is the method that will help the
intruders to inject the corrupted code in the query of the database. Through this attack the
intruders can access the places in database those are normally restricted for the normal users.
Through this type of the attack, the attackers can modify and delete the data and information
from the web database whenever it is needed. The intruders can become harmful for both the
web application and the users using the web application. The attack can make the system and
the resources unavailable to the users that can generate the loss of million dollars. On the
other hand , another attack mentioned in this context is Server Misconfiguration and
Predictable page and these are more related to the vulnerability of the site and the lack of
security of the webpage. The target of this type of attack is generally the servers.
Other types of attacks those can be mentioned in this context are Breaking
Authentication Schemes, Logic Attacks and the web of Distrust. According to Gajanan P.
Bherde and M.A. Punds “Breaking Authentication” includes basic authentication, form based
authentication, and single sign-on authentication for the web application users. Through these
attacks the intruders can gain access to the unauthorized places. In case, if the intruders can
break into the web application they can change or modify the logics in the code of the web
page. Gajanan P. Bherde and M.A. Punds defines the logic attacks as development of the
logical application by the developers. However, this type of attacks are undetectable as the
lack of validation. Apart from that this type of attacks can become dangerous because the
intruders can change the sequence of the execution of the program. This type of attack is
harmful for the software and can become a threat for the system. Apart from that through the
Xpath injection, Xquery Injection and Xss Injection the intruders can add the malicious codes
in the software.
Another type of attack discussed in this context is Structured Query Language
Injection (SQL Injection). According to Gajanan P. Bherde and M.A. Punds, the SQL Query
injection is used for attacking the database applications. This is the method that will help the
intruders to inject the corrupted code in the query of the database. Through this attack the
intruders can access the places in database those are normally restricted for the normal users.
Through this type of the attack, the attackers can modify and delete the data and information
from the web database whenever it is needed. The intruders can become harmful for both the
web application and the users using the web application. The attack can make the system and
the resources unavailable to the users that can generate the loss of million dollars. On the
other hand , another attack mentioned in this context is Server Misconfiguration and
Predictable page and these are more related to the vulnerability of the site and the lack of
security of the webpage. The target of this type of attack is generally the servers.
Other types of attacks those can be mentioned in this context are Breaking
Authentication Schemes, Logic Attacks and the web of Distrust. According to Gajanan P.
Bherde and M.A. Punds “Breaking Authentication” includes basic authentication, form based
authentication, and single sign-on authentication for the web application users. Through these
attacks the intruders can gain access to the unauthorized places. In case, if the intruders can
break into the web application they can change or modify the logics in the code of the web
page. Gajanan P. Bherde and M.A. Punds defines the logic attacks as development of the
logical application by the developers. However, this type of attacks are undetectable as the
lack of validation. Apart from that this type of attacks can become dangerous because the
intruders can change the sequence of the execution of the program. This type of attack is
harmful for the software and can become a threat for the system. Apart from that through the
Xpath injection, Xquery Injection and Xss Injection the intruders can add the malicious codes
in the software.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3THREAT DETECTION TECHNIQUE
It is the responsibility of the individual users to prevent the attacks from occurring.
For the detection and the prevention of the attack there are five approaches those can be
followed. One of these prevention and detection technique is Signature Based Detection. This
type of prevention and detection technique work on the threats those are already detected.
According to Gajanan P. Bherde and M.A. Punds in this system each of the packets arrived in
the system are evaluated on the basis of the list. When the first attack occurs it is known as
zero day attacks. The method is suitable for the lower end detection. Another prevention
technique is knowledge based detection. In this type of detection technique the system can
detect the vulnerabilities along with the knowledge regarding the previous attacks. On the
basis of this the suspicious users are identified. The difference between the behavior patterns
of the users and attackers can be done through the knowledge based system.
Through the Statistical Based Detection the normal activities of the network is
defined. If the system finds the activity not normal it tags the behaviour as harmful activity
for the network. The technique is based on the algorithm that examines the network pattern
and detects the malicious activities. For each pack the threshold score and anomaly score is
detected for each packet. The packet is treated as malicious if the anomaly score is greater
than the threshold score. On the other hand with the application of the behaviour detection
technique the web application system can be labelled as the normal or malicious. Apart from
that this technique can also able to identify the future behaviour of the attackers.
A statistical based method is hybrid based detection. This method has all the
advantages of the of threat detection technique. This type of detection system will work
effectively to detect the malware in the software development program without skipping all
the warnings. This method is capable to prevent and detect the external attackers to damage
the systems.
It is the responsibility of the individual users to prevent the attacks from occurring.
For the detection and the prevention of the attack there are five approaches those can be
followed. One of these prevention and detection technique is Signature Based Detection. This
type of prevention and detection technique work on the threats those are already detected.
According to Gajanan P. Bherde and M.A. Punds in this system each of the packets arrived in
the system are evaluated on the basis of the list. When the first attack occurs it is known as
zero day attacks. The method is suitable for the lower end detection. Another prevention
technique is knowledge based detection. In this type of detection technique the system can
detect the vulnerabilities along with the knowledge regarding the previous attacks. On the
basis of this the suspicious users are identified. The difference between the behavior patterns
of the users and attackers can be done through the knowledge based system.
Through the Statistical Based Detection the normal activities of the network is
defined. If the system finds the activity not normal it tags the behaviour as harmful activity
for the network. The technique is based on the algorithm that examines the network pattern
and detects the malicious activities. For each pack the threshold score and anomaly score is
detected for each packet. The packet is treated as malicious if the anomaly score is greater
than the threshold score. On the other hand with the application of the behaviour detection
technique the web application system can be labelled as the normal or malicious. Apart from
that this technique can also able to identify the future behaviour of the attackers.
A statistical based method is hybrid based detection. This method has all the
advantages of the of threat detection technique. This type of detection system will work
effectively to detect the malware in the software development program without skipping all
the warnings. This method is capable to prevent and detect the external attackers to damage
the systems.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4THREAT DETECTION TECHNIQUE

5THREAT DETECTION TECHNIQUE
References
Bherde, Gajanan P., and M. A. Pund. “Recent Attack Prevention Techniques in Web
Service Applications.” Pace University Library Remote Database
Authentication, 16 Mar. 2016,
ieeexplore-ieorg.rlib.pace.edu/document/7877771/authors#authors.
References
Bherde, Gajanan P., and M. A. Pund. “Recent Attack Prevention Techniques in Web
Service Applications.” Pace University Library Remote Database
Authentication, 16 Mar. 2016,
ieeexplore-ieorg.rlib.pace.edu/document/7877771/authors#authors.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 6
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.