ﷺ
شہرِ نبیؐ میں مکّہ سے ہو کر چلیں گے ہم
دامانِ داغدار کو دھو کر چلیں گے ہم
تر دامنی کو اشکِ ندامت سے دھوئیں گے
عشقِ نبیؐ میں خود کو ڈبو کر چلیں گے ہم
روئیں گے خوب شہرِ مدینہ کی یاد میں
اشکوں کے خوب ہار پرو کر چلیں گے ہم
روح و دل و دماغ میں طیبہ کی ہو فضا
یوں صحنِ جاں میں شوق کو بو کر چلیں گے ہم
’’ماذاغ‘‘ کی ادا کا تکلّم کلیمؑ سے
تم کام کر نہ پائے تھے جو ؛ کر چلیں گے ہم
آغوش میں یوں نیند نے لے کر مجھے کہا
آؤ درِ رسولؐ پہ سو کر چلیں گے ہم
عرفانؔ ! اب تو عزم یہی چشمِ تر کا ہے
داغِ غمِ فراق کو دھو کر چلیں گے ہم
"The word "Ablagh" means to convey, to transfer, to communicate the term "Tableegh "is derived from this word. In the Holy Quran the words like "Tableegh" "Da’wa" "Inzar" and "Tabsheer" have been used for communication purpose. "Tableegh" means to persuade someone for the good deeds and prohibit him from the bad forbidden things. Tableegh is a process in which someone is invited sincerely towards an noble cause. In the Holy Quran Tableegh has been declared "Farz"(something which all the followers are supposed to do as binding) for all the Muslims. In the modern era the ways of communication are enormous and varied. The most important are the electronic and print media. Television, computer and radio, on the one hand and books, magazines and the newspapers on the other hand, play their respective role. Recently internet has emerged as the most important organ to address the people. Hence these current modes of communication should be reviewed according to the Seerah ofthe Holy Prophet (P. B. U. H) .
Cyber Civilization has become an important source of information sharing and professional activities. It is a rapid and concert source for boosting the economy of the world. The exponential increase in cyber threats with the expansion of web applications has become the biggest security concern to e-business, medical data, personal privacy and defense systems. Presently the social networks, Internet connected mobile devices, individual privacy, and the online connectivity of entities such as e-shopping, e-banking or e- commerce are the most enticing targets for cyber criminals. Sophisticated approaches are used to launch polymorphic attacks to exploit the vulnerabil- ities of web applications. Recent surveys show that more than 80% attacks targeting the application layer, 90% applications are vulnerable to attacks and on the average 15 new vulnerabilities are released per day. These facts seem justified to prove that current state of the art security solutions are ineffective to provide sufficient security solution. These solutions inherently have static nature in attack detection, lack of expressiveness in attack detec- tion rules, and absence of reasoning capability that are required for detecting unanticipated ways to launch an attack. In this dissertation, a new methodology has been adopted that has for- mal grounding and mitigated the problems in the domain of web application security. The proposed methodology is an ontology based technique that is used for detecting and classifying web application attacks. It specifies web application attacks by using semantic rules, the context of consequence and the specifications of application protocols. The approach is capable of detect- ing sophisticated attacks effectively and efficiently by analyzing the specified portion of a user request where attacks are possible. Semantic rules / signa- tures help to capture the context of the application, possible attacks and the protocol used. These rules also allow inference to run over the ontological models in order to detect, the often complex polymorphic variations of web application attacks. The proposed approach is used for model specification, logic inference and attack vector analysis techniques utilized to generalization of attack rules. The ontological models are developed in Protege framework by using De- scription Logic that is based on the Web Ontology Language (OWL). The inference rules are Horn Logic statements and are implemented by using the Apache JENA framework. The approach is therefore platform and technol- ogy independent. Prior to the evaluation of the approach the knowledge models are validated by using OntoClean to remove inconsistency, incom- pleteness and redundancy in the specification of ontological concepts. The experimental results show that the detection capability and performance of our approach is significantly better than current state of the art solutions. The approach successfully detects web application attacks whilst generat- ing few false positives. The examples that are presented demonstrate that a semantic approach can be used to effectively detect zero day and more sophisticated attacks in a real-world environment. For clarity and validity of models, some useful functionalities and specifications of semantic rules, protocol, and attack ontology are formally modeled by using Z notation.