Search or add a thesis

Advanced Search (Beta)
Home > Formal Semantic Model for Web Applications Security- an Intelligent Approach for Detecting and Classifying Cyber Attacks

Formal Semantic Model for Web Applications Security- an Intelligent Approach for Detecting and Classifying Cyber Attacks

Thesis Info

Access Option

External Link

Author

Razzaque, Abdul

Program

PhD

Institute

National University of Sciences & Technology

City

Islamabad

Province

Islamabad

Country

Pakistan

Thesis Completing Year

2014

Thesis Completion Status

Completed

Subject

Computer Science

Language

English

Link

http://prr.hec.gov.pk/jspui/bitstream/123456789/2729/1/2901S.pdf

Added

2021-02-17 19:49:13

Modified

2024-03-24 20:25:49

ARI ID

1676727761394

Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.

Similar


Cyber Civilization has become an important source of information sharing and professional activities. It is a rapid and concert source for boosting the economy of the world. The exponential increase in cyber threats with the expansion of web applications has become the biggest security concern to e-business, medical data, personal privacy and defense systems. Presently the social networks, Internet connected mobile devices, individual privacy, and the online connectivity of entities such as e-shopping, e-banking or e- commerce are the most enticing targets for cyber criminals. Sophisticated approaches are used to launch polymorphic attacks to exploit the vulnerabil- ities of web applications. Recent surveys show that more than 80% attacks targeting the application layer, 90% applications are vulnerable to attacks and on the average 15 new vulnerabilities are released per day. These facts seem justified to prove that current state of the art security solutions are ineffective to provide sufficient security solution. These solutions inherently have static nature in attack detection, lack of expressiveness in attack detec- tion rules, and absence of reasoning capability that are required for detecting unanticipated ways to launch an attack. In this dissertation, a new methodology has been adopted that has for- mal grounding and mitigated the problems in the domain of web application security. The proposed methodology is an ontology based technique that is used for detecting and classifying web application attacks. It specifies web application attacks by using semantic rules, the context of consequence and the specifications of application protocols. The approach is capable of detect- ing sophisticated attacks effectively and efficiently by analyzing the specified portion of a user request where attacks are possible. Semantic rules / signa- tures help to capture the context of the application, possible attacks and the protocol used. These rules also allow inference to run over the ontological models in order to detect, the often complex polymorphic variations of web application attacks. The proposed approach is used for model specification, logic inference and attack vector analysis techniques utilized to generalization of attack rules. The ontological models are developed in Protege framework by using De- scription Logic that is based on the Web Ontology Language (OWL). The inference rules are Horn Logic statements and are implemented by using the Apache JENA framework. The approach is therefore platform and technol- ogy independent. Prior to the evaluation of the approach the knowledge models are validated by using OntoClean to remove inconsistency, incom- pleteness and redundancy in the specification of ontological concepts. The experimental results show that the detection capability and performance of our approach is significantly better than current state of the art solutions. The approach successfully detects web application attacks whilst generat- ing few false positives. The examples that are presented demonstrate that a semantic approach can be used to effectively detect zero day and more sophisticated attacks in a real-world environment. For clarity and validity of models, some useful functionalities and specifications of semantic rules, protocol, and attack ontology are formally modeled by using Z notation.
Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

۳۲۔ ہم ہر لمحہ فسوں میں ہیں

ہم ہر لمحہ فسوں میں ہیں

ہم نجانے کس فسوں میں ہیں

خود سے بے خبر ،منتشر منتشر

شب و روز کے فریب میں

 سایۂ آسیب میں

ہم اس فریب کے فسوں میں ہیں

جس میں زندگی کی حلاوتیں ،کرواہٹوں میں بدل گئیں

مسکراہٹیں ،قہقہے،محفلیں،سب آہٹوں میں بدل گئیں

کیا ان دروازوں کو گرا نہ دیں؟

اب کوئی دستک نہیں دیتا

کیا ان مکانوں کو ڈھا نہ دیں؟

...

عدالتی خلع اورپاکستانی عدالتوں کے فیصلوں کی روشنی میں اس کی قانونی بنیادیں Judicial Khul’ and its Legal Grounds in the light of Decisions of Pakistani Courts

The doctrine of Khul’ has, within the course of last few years, assumed a great deal of importance in Pakistan because literacy rate in women is increasing rapidly and their dependency on men is decreasing. Now, women can easily make their own decisions with free consent due to their some awareness about their rights, especially regarding dissolution of marriage. Majority of women is still ignorant about dissolution of marriage on the ground of Khul’. Therefore, it is very necessary to explain all different aspects of “doctrine of Khul’” for ensuring justice in our society. The present research has mainly explored the grounds of judicial Khul’ and other relevant incidents in the light of Pakistani Case Law based on Islamic family Law. The research is based primarily on the decisions of superior courts of Pakistan. The decisions of family courts of Pakistan have been included in the discussion. The relevant provisions of the Dissolution of Muslim Marriages Act, 1939 and the Family Courts Act, 1964 have also been debated. The difference between Khul’ and other modes of dissolution of marriage have also been elaborated briefly.

Human Security Challenges to Pakistan Water Scarcity, Food Shortage and Militancy

Human security is a new concept in security studies that emerged in 1990s in the arena of global politics and shifted the focus of security studies from statehood to humans. Countries started to focus at human security while managing their national security policies but many countries of world neglected the human security values in formulation of their national policies and Pakistan is one of those countries. Blend of human security challenges has gradually emerged in Pakistani society due to its negligence in addressing human security issues particularly water scarcity, food shortage and militancy. Fragmented character of society has politicized the water issue in the productions of more water reservoirs which has created the water scarcity in the country that led to food shortage in the society. Common people are deprived from their basic necessities of life which has created the annoyance in deprived people who stood against the writ of government and a wave of militancy has been instigated in almost every part of country. The current research work has analyzed all aforesaid human security challenges to Pakistan in detail. For this purpose, a questionnaire was developed and responded by academia from 10 universities of Pakistan representing all provinces and centre as well. The respondents were 25 students of Masters, MPhil and PhD level and 5 faculty members from Political Science and International Relations departments from each university and collected data has been analyzed by using the Statistical Package for the Social Studies (SPSS) to reach the sound conclusion. Current research work has recommended that the human security challenges to Pakistan such as water scarcity, food shortage and militancy may be addressed appropriately by adopting the comprehensive strategy comprising the use of force, diplomatic ways of negotiations and social elevation of common people in the society.