Download presentation
Presentation is loading. Please wait.
Published byEsmond Fields Modified over 8 years ago
2
Abstract Introduction Literature Survey Conclusion on Literature Survey Threat model and system architecture Proposed Work Attack Scenarios Experimental Setup Advantages Conclusion References
3
Internet services and applications have becomean inextricable part of daily life, enabling communication and the management of personal information from anywhere. In this paper, we present Double Guard, an IDS system that models the network behavior of user sessions across both the front-end webserver and back-end database.
4
Double Guard: Detecting intrusions in multitier web applications
5
DoubleGuard :Detecting Intrusions in Multitier Web Appliction. Authors-: Meixing Le,Angelos Stavrou Brent ByungHoon Kang The paper suggests the model for the use of Double Guard Detecting intrusion in Multitier web Application is very more security.
6
Limitation of Security -: Low Secure Authentication Low User Identification mechanism Low computational power Low Content Security
7
Threat model to include our assumption & type of attacks we are aiming to protect against. The attack are network borne & come from the web client, they can launch application layer attack to compromise the webserver they are connecting to.
11
Privilege Escalation attack Hijack Future session Attack Injection Attack Direct DB Attack
13
More Secure Authentication For Organization Security
14
Hardware Required: o System : Pentium IV 2.4 GHz o Hard Disk : 40 GB o RAM : 256 MB
15
Software Required: O/S : Windows XP. Win 07. Language : Asp.Net with c#,java, Data Base : Sql Server 2005
16
We presented an intrusion detection system that builds models of normal behavior web appliction from both front end web request and back end database queries. DoubleGurad forms a container based IDS with multiple input stream to produce alerts.
17
Google.com Vidhata.com Chennaisunday.com SANS, “The Top Cyber Security Risks,” http://www.sans.org/ top-cyber-security-risks/, 2011. National Vulnerability Database, “Vulnerability Summary for “CVE-2010-4332,” http://web.nvd.nist.gov/view/vuln/detail? vulnId= CVE-2010-4332, 2011.
18
Thank you
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.