Anomaly Detection Using Negative Security Model in Web Application
INTRODUCTION
The Internet services and use of web application are
increasing rapidly around the world. But unfortunately it has
been found easy to disturb the functionality of the Internet by
attacking its infrastructure taking advantage of Internet
services, and protocols. Thus hackers feel that the website
and web application, in general web as the warfare.
In order to hack a web application a web hacker needs
the following (a) A web browser (b) An Internet connection
(c) a port scanner, netcat, whisker(vulnerability checker)
OpenSSL etc.. Web hacks falls under the following
categories 1. URL interpretation attacks 2. Input validation
attacks 3. SQL injection attacks 4. Impersonation attacks 5.
Buffer overflow attacks. These attacks disallow regular
services from being accessed by legitimate users. In today's
world, web servers and web based applications are the
popular corporate applications and become the targets of the
attackers.
Anomaly or misuse detection of web attacks consists of
rules and descriptions. These detections do not consider pre