Skip to main content
Top

2022 | OriginalPaper | Chapter

Web Vulnerability Detection: The Case of Cross-Site Request Forgery Using Classification and Regression Trees

Authors : Rajendra Gurram, P. Dhanunjaya Babu, Adusumalli Sai Tejaswi, Chattu Sai Ganesh, Karlaputi Narendra

Published in: Distributed Computing and Optimization Techniques

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In the world of hacking, one of the simple and human-understandable web attacks is Cross-Site request forgery, but this is the most top priority attack that needed to handle with keen observation because of the very small difference in their appearance. A hacker develops a cross-site application that looks similar to the original site and embeds this URL in either back transactions or E-commerce applications, it misleads the user to deviate from the original website without his notice by disabling all the authentication mechanisms. The hackers develop this type of cross website by embedding the SQL injection queries either in HTML navigation pages or while executing the external Java Scripts. To develop a solution for this type of attack, the system needs a tool that balances both scalability and usability because of millions of users working with the internet to performs various tasks on social media platforms. This tool can also isolate web attacks by designing robust web applications which include advanced encryption algorithms, which require a lot of effort to decrypt the source code. The developers of the website have to work a lot to take care of the security functionalities, negligence of which may cost the website source code to be hacked. Accidentally, Cross-Site request forgery (CSRF) attacks can be left behind, which motivated recent research on asynchronous Cross-Site request forgery detection. The proposed paper uses the Classification and Regression Trees (CART) Algorithm to detect phishing websites based on the URL posted.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
3.
go back to reference Arora N, Singh P, Sahu S, Keshari VK, Vinoth Kumar M (2021) Preventing SSRF (Server-Side Request Forgery) and CSRF (Cross-Site Request Forgery) using extended visual cryptography and QR Code. In: Goyal D, Chaturvedi P, Nagar AK, Purohit S (eds) Proceedings of Second International Conference on Smart Energy and Communication. AIS. Springer, Singapore. https://doi.org/10.1007/978-981-15-6707-0_20 Arora N, Singh P, Sahu S, Keshari VK, Vinoth Kumar M (2021) Preventing SSRF (Server-Side Request Forgery) and CSRF (Cross-Site Request Forgery) using extended visual cryptography and QR Code. In: Goyal D, Chaturvedi P, Nagar AK, Purohit S (eds) Proceedings of Second International Conference on Smart Energy and Communication. AIS. Springer, Singapore. https://​doi.​org/​10.​1007/​978-981-15-6707-0_​20
8.
go back to reference Alves H, Fonseca B, Antunes N (2016) Experimenting machine learning techniques to predict vulnerabilities. In: 2016 Seventh Latin-American symposium on dependable computing (LADC), pp 151–156. IEEE Alves H, Fonseca B, Antunes N (2016) Experimenting machine learning techniques to predict vulnerabilities. In: 2016 Seventh Latin-American symposium on dependable computing (LADC), pp 151–156. IEEE
9.
10.
16.
go back to reference Mallikarjuna A, KarunaSree B (2019) Security towards flooding attacks in inter domain routing object using ad hoc network. Int J Eng Adv Technol (IJEAT) 8(3) Mallikarjuna A, KarunaSree B (2019) Security towards flooding attacks in inter domain routing object using ad hoc network. Int J Eng Adv Technol (IJEAT) 8(3)
Metadata
Title
Web Vulnerability Detection: The Case of Cross-Site Request Forgery Using Classification and Regression Trees
Authors
Rajendra Gurram
P. Dhanunjaya Babu
Adusumalli Sai Tejaswi
Chattu Sai Ganesh
Karlaputi Narendra
Copyright Year
2022
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-19-2281-7_78

Premium Partner