Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/13663
Title: Intelligent techniques for securing web applications from SQL injections and XSS attacks
Researcher: Selvamani .K
Guide(s): Kannan, A.
Keywords: Intelligent techniques, web applications, SQL injections, Cross Site Scripting, Structured Query Language
Upload Date: 5-Dec-2013
University: Anna University
Completed Date: 
Abstract: In this thesis, an architectural framework for an web application security system that secures web applications intelligently from Cross Site Scripting (XSS) attacks and Structured Query Language (SQL) injection attacks has been proposed and implemented. This system provides intelligent techniques for effective detection and prevention of stored XSS attacks and reflected XSS attacks in the browser and server side of web applications. For this purpose, new techniques have been proposed for intelligent query classification that helps to classify queries into normal and malicious queries. In this thesis, an architectural framework for an web application security system that secures web applications intelligently from Cross Site Scripting (XSS) attacks and Structured Query Language (SQL) injection attacks has been proposed and implemented. This system provides intelligent techniques for effective detection and prevention of stored XSS attacks and reflected XSS attacks in the browser and server side of web applications. For this purpose, new techniques have been proposed for intelligent query classification that helps to classify queries into normal and malicious queries. Finally, this thesis provides a web based anomaly intrusion detection technique that uses fuzzy rules to detect and prevent the anomalies in web applications. For this purpose, this system uses a new Role Based Access Control (RBAC) policy which is enforced using intelligent rules by an access control manager. This role based access control technique provides options to the user for executing the prevention techniques based on the anomaly score level received from the fuzzy rules. Moreover, this newly proposed technique is capable of making effective decisions by using probability values in order to reduce the SQL injections attacks and anomalies on web applications. newline newline newline
Pagination: xiv, 117
URI: http://hdl.handle.net/10603/13663
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File34.35 kBAdobe PDFView/Open
02_certificates.pdf1.89 MBAdobe PDFView/Open
03_abstract.pdf13.61 kBAdobe PDFView/Open
04_acknowledgement.pdf763.24 kBAdobe PDFView/Open
05_contents.pdf29.6 kBAdobe PDFView/Open
06_chapter 1.pdf65.24 kBAdobe PDFView/Open
07_chapter 2.pdf74.33 kBAdobe PDFView/Open
08_chapter 3.pdf39.78 kBAdobe PDFView/Open
09_chapter 4.pdf156.56 kBAdobe PDFView/Open
10_chapter 5.pdf80.15 kBAdobe PDFView/Open
11_chapter 6.pdf78.63 kBAdobe PDFView/Open
12_chapter 7.pdf19.39 kBAdobe PDFView/Open
13_references.pdf50.65 kBAdobe PDFView/Open
14_publications.pdf14.27 kBAdobe PDFView/Open
15_vitae.pdf11.33 kBAdobe PDFView/Open


Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.