Abstract

Owing to the surfacing of new technologies which can abet easier and faster processing of data, there has been a increasing need for most organization to develop an online system. Most of these systems are developed using php programming language. This paper shows that most of these web-based systems are vulnerable to different types of attacks resulting from the disregard to security appraise during the development of the system. Security of information asset which are painstaking to any organization is one of the most important tasks which need to be safeguard regularly. Critical information infrastructure protection (CIIP) had become a lingering area of interest in the modern days of information dissemination, from the inauguration of internet to the modern elevated-profile dispersed denial-of-service assail against critical systems. Critical systems rely deeply on information communication; the interruptions of the information communication can obstruct the operation of critical systems. The western nations have advanced CIIP elucidation in place, but these elucidations are not always suitable for growing countries, where exceptional contest and necessities have to be addressed. Meanwhile, the western worlds are familiarizes with unmatched improvement of their information infrastructures. However, the lack of national CIIP efforts creates a situation for developing nations to become launch pads for cyber-attacks. In this paper, I have proposed a Network Traffic Analyzer that will analyze source codes of web based critical infrastructures and detect vulnerability in the codes for better security from attacks.

Highlights

  • Dependability and smooth operation of system control are highly depend on the spectrum of inter-reliant of national and international software based dominant in solving national security [1, 2]

  • The Critical Infrastructure (CI) conveys a spread of services to individuals, and society as a whole, depending on the extent of the information dissemination in the organisation

  • Malware Detection and Framework Analysis for Windows based API was design by [14], the work "Windows API based ", came up with a proposal for malware detection method that is based on mining applicable Application Programming Interface (API) calls from sub classes of malware

Read more

Summary

Introduction

Dependability and smooth operation of system control are highly depend on the spectrum of inter-reliant of national and international software based dominant in solving national security [1, 2]. Encompasses a ‘force multiplier’ effect, allowing even a comparatively small attack to realize a far greater impact For this reason, CI structures and networks have historically proven to be appealing targets for a full array of actors (OCIPEP, 2003). A network traffic analyzer is sometimes a combination of related hardware and or software (computer program), or at other times an unconnected hardware component, which an organization can install on either a computer or network to increase their defense or protection against malicious activity or hackers. Emergence of newer technology has given room for network analyzers which are just software. This makes it easier and cheaper for professionals who may require it to effectively detect faults in a network.

Literature Review
Methodology
Results

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.