Preview

Double Guard

Powerful Essays
Open Document
Open Document
13836 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Double Guard
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. IEEE TRANSACTIONS ON DEPEDABLE AND SECURE COMPUTING

DoubleGuard: Detecting Intrusions In Multi-tier Web Applications
Meixing Le George Mason University Angelos Stavrou George Mason University Brent ByungHoon Kang George Mason University

Abstract—Internet services and applications have become an inextricable part of daily life, enabling communication and the management of personal information from anywhere. To accommodate this increase in application and data complexity, web services have moved to a multi-tiered design wherein the web server runs the application front-end logic and data is outsourced to a database or file server. In this paper, we present DoubleGuard, an IDS system that models the network behavior of user sessions across both the front-end web server and the back-end database. By monitoring both web and subsequent database requests, we are able to ferret out attacks that an independent IDS would not be able to identify. Furthermore, we quantify the limitations of any multitier IDS in terms of training sessions and functionality coverage. We implemented DoubleGuard using an Apache web server with MySQL and lightweight virtualization. We then collected and processed real-world traffic over a 15-day period of system deployment in both dynamic and static web applications. Finally, using DoubleGuard, we were able to expose a wide range of attacks with 100% accuracy while maintaining 0% false positives for static web services and 0.6% false positives for dynamic web services. Index Terms—anomaly detection, virtualization, multi-tier web application

I. I NTRODUCTION Web-delivered services and applications have increased in both popularity and complexity over the past few years. Daily tasks, such as banking, travel, and social networking, are all done via the web. Such services typically

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 1 Case Study

    • 776 Words
    • 4 Pages

    Security: Web applications are typically deployed on dedicated servers, which are monitored and maintained by experienced server…

    • 776 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Turban, E., Rainer, K., & Potter, R. (2003). Introduction to Information Technology (8th ed.). New York: John Wiley & Sons, Inc. .…

    • 979 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Module 2

    • 5116 Words
    • 21 Pages

    Web services are client and server applications that communicate over the World Wide Web’s (WWW) by using Hyper Text Transfer Protocol (HTTP). Web services provide a standard means of interoperating between software applications running on a variety of platforms and frameworks. It has two participants:…

    • 5116 Words
    • 21 Pages
    Satisfactory Essays
  • Good Essays

    Csia 301 - Syllabus

    • 4678 Words
    • 19 Pages

    Prerequisite: CMIS 102. A comprehensive introduction to the protection of business information and the systems that support business processes. The objective is to identify common threats and attacks employed against Web-accessible applications, analyze the role of security models and architectures, explain the role of cryptography, and analyze issues related to security management and network security.…

    • 4678 Words
    • 19 Pages
    Good Essays
  • Satisfactory Essays

    Unit 1&2 Discussion

    • 379 Words
    • 2 Pages

    Security of web applications first begins with configuring the server itself with strict security in mind. Many will often deploy various layers such as a WAF, IDS, or Mod Security to react in real time to various hacking and threats for HTTP requests. However, securing the entire server and any running services with a high level of security in mind is the first fundamental step to avoid the risk of being hacked or compromised.…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    ICA50611 - Diploma of Website Development ICA50111 - Diploma of Information Technology ICAICT507A, ICAICT509A, CUFDIG502A Web Environments…

    • 479 Words
    • 2 Pages
    Powerful Essays
  • Satisfactory Essays

    20th centurt

    • 671 Words
    • 3 Pages

    During the 1990s, the Internet remained largely the province of specialists, including defense personnel and scientists. The creation of browsers, or software that provided a convenient graphical interface between user and machine, revolutionized the…

    • 671 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Website Migration Project

    • 2957 Words
    • 12 Pages

    Professional Growth Web Publishing (n.d.). Comm Tech Lab, Activity Four, Setting up a Web Server (n.d.). Retrieved on June 8, 2013, from http://www.commtechlab.msu.edu/sites/letsnet/NoFrames/BigIdeas/b9/b9u5l4.html…

    • 2957 Words
    • 12 Pages
    Better Essays
  • Better Essays

    You will be able to suggest appropriate defenses against common Web server and application attacks.…

    • 1988 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Syllabus

    • 627 Words
    • 3 Pages

    Chapter 2 The Internet and World Wide Web and Making use of the Web Pages 43 - 94 DB 2 (Word) Chapter 3 Application Software & Digital Video Technology Pages 95 - 134…

    • 627 Words
    • 3 Pages
    Satisfactory Essays
  • Best Essays

    Individual Assignment 1

    • 2342 Words
    • 10 Pages

    Having a strong web presence is not only important in today’s world, it is vital for survival in today’s super connected world. Companies, banks, agencies and private industries must be able to create an environment to interact with customers, government officials and other companies in order to thrive. Opening yourself up to anyone through the Internet often means opening your system up to the world. Today we are more connected than ever, and cyberspace is littered with a multitude of individuals, some with the intent to compromise network confidentiality, integrity and availability. Anyone with a computer and Internet access can become a victim or criminal over the web. As a result, networks and servers are under constant attack these days. Attackers are changing their techniques daily and are on a never ended endeavor to disrupt companies for their selfish reasons. Two such forms of disruption are Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks. These forms of disruption have cost companies millions of dollars and are showing no signs of stopping. That is why it is up to security professionals to create the best safeguards and impose efficient and proper techniques to prevent, mitigate and discover these attacks before they inflict terrible harm. In the following assignment, these important topics of prevention, mitigation and discovery will be discussed as they relate to DoS and DDoS attacks on today’s systems. Specifically, three academic journals have been selected that relate to this topic. This essay will first briefly summarize each article that was selected and state the methods of prevention, mitigation or discovery as they relate to denial of service attacks. The second part of this essay will explore in detail the specific methods discussed in the summaries as they relate to a proposed technique and practical…

    • 2342 Words
    • 10 Pages
    Best Essays
  • Satisfactory Essays

    miss

    • 494 Words
    • 2 Pages

    Applications of Digital Information and Web Technologies, 2008. ICADIWT 2008. First International Conference on the…

    • 494 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Oijojojojijo

    • 3923 Words
    • 16 Pages

    Part 2: The Web service client application © Copyright IBM Corporation 2009. All rights reserved.…

    • 3923 Words
    • 16 Pages
    Powerful Essays
  • Best Essays

    References: International Journal of Internet Computing (IJIC), ISSN No: 2231 – 6965, Volume-1, Issue-2, 2011…

    • 2622 Words
    • 11 Pages
    Best Essays