Abstract

In recent years, widespread adoption of the internet has resulted in rapid advancement in information technologies. Internet is used by the general population for the purposes such as financial transactions, educational activities and countless other activities. This development of the Internet use has unfortunately been accompanied by a growth of malicious activity in the web application. Every organization uses web application for accessing their data from the database, these applications use user inputs to create a query for storing, retrieving data from the database. Although all the organizations are concerned about their data security, the attackers can still corrupt the data by using the techniques like SQL injection, Hijack future session attack, Privilege Escalation attack, which are commonly referred to as intrusion, it also includes another Application layer attack called DDoS attack. In this paper we present a novel approach for detecting all the intrusions and Application layer attack by analyzing user behavior and analyzing the user input queries using low interaction Honeypot technique.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.