Skip to main content

2018 | OriginalPaper | Buchkapitel

A Novel Algorithm to Protect Code Injection Attacks

verfasst von : Hussein Alnabulsi, Rafiqul Islam, Qazi Mamun

Erschienen in: International Conference on Applications and Techniques in Cyber Security and Intelligence

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The Code Injection Attack (CIA) exploits a security vulnerability or computer bug that is caused by processing invalid data, CIA is a serious attack problem that attackers try to introduce any new methodologies to bypass the defense system. In this paper, we introduce a novel detection algorithm for detection of code injection attack. Our empirical performance shows that the proposed algorithm give better results compared to existing results.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Qbea’h, M., Alshraideh, M., Sabri, K.E.: Detecting and preventing SQL injection attacks: a formal approach. In: Cybersecurity and Cyberforensics Conference (CCC), pp. 123–129. IEEE, Amman (2016) Qbea’h, M., Alshraideh, M., Sabri, K.E.: Detecting and preventing SQL injection attacks: a formal approach. In: Cybersecurity and Cyberforensics Conference (CCC), pp. 123–129. IEEE, Amman (2016)
2.
Zurück zum Zitat Xiao, X., Yan, R., Ye, R., Li, Q., Peng, S., Jiang, Y.: Detection and prevention of code injection attacks on HTML5-based apps. In: Third International Conference on Advanced Cloud and Big Data, pp. 254–26. IEEE, Yangzhou (2015) Xiao, X., Yan, R., Ye, R., Li, Q., Peng, S., Jiang, Y.: Detection and prevention of code injection attacks on HTML5-based apps. In: Third International Conference on Advanced Cloud and Big Data, pp. 254–26. IEEE, Yangzhou (2015)
3.
Zurück zum Zitat Priyaa, D., Devi, I.: Fragmented Query parse tree based SQL injection detection system for web applications. In: International Conference on Computing Technologies and Intelligent Data Engineering (ICCTIDE’16), pp. 1–5. IEEE, Kovilpatti (2016) Priyaa, D., Devi, I.: Fragmented Query parse tree based SQL injection detection system for web applications. In: International Conference on Computing Technologies and Intelligent Data Engineering (ICCTIDE’16), pp. 1–5. IEEE, Kovilpatti (2016)
4.
Zurück zum Zitat Zhao, Z., Ahn, G.: Using instruction sequence abstraction for shellcode detection and attribution. In: Conference on Communications and Network Security (CNS), pp. 323–331. IEEE, National Harbor, MD (2013) Zhao, Z., Ahn, G.: Using instruction sequence abstraction for shellcode detection and attribution. In: Conference on Communications and Network Security (CNS), pp. 323–331. IEEE, National Harbor, MD (2013)
5.
Zurück zum Zitat Qu, B., Liang, B., Jiang, S., Ye, C.: Design of automatic vulnerability detection system for web application program. In: 4th International Conference on Software Engineering and Service Science, pp. 89–92. IEEE, Beijing (2013) Qu, B., Liang, B., Jiang, S., Ye, C.: Design of automatic vulnerability detection system for web application program. In: 4th International Conference on Software Engineering and Service Science, pp. 89–92. IEEE, Beijing (2013)
6.
Zurück zum Zitat Priyaa, D., Devi, I.: Hybrid SQL injection detection system. In: 3rd International Conference on Advanced Computing and Communication Systems (ICACCS), pp. 1–5. IEEE, Coimbatore (2016) Priyaa, D., Devi, I.: Hybrid SQL injection detection system. In: 3rd International Conference on Advanced Computing and Communication Systems (ICACCS), pp. 1–5. IEEE, Coimbatore (2016)
8.
Zurück zum Zitat Alnabulsi, H., Islam, R., Mamun, Q.: Detecting SQL injection attacks using SNORT IDS. In: Asia-Pacific World Congress on Computer Science and Engineering Conference, pp. 1–7. IEEE, Nadi (2014) Alnabulsi, H., Islam, R., Mamun, Q.: Detecting SQL injection attacks using SNORT IDS. In: Asia-Pacific World Congress on Computer Science and Engineering Conference, pp. 1–7. IEEE, Nadi (2014)
Metadaten
Titel
A Novel Algorithm to Protect Code Injection Attacks
verfasst von
Hussein Alnabulsi
Rafiqul Islam
Qazi Mamun
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-67071-3_35