International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064

Downloads: 103

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 5, May 2014

A Survey On XML-Injection Attack Detection Systems

Swati Ramesh Kesharwani, Aarti Deshpande

Web services are increasingly used as distributed systems on the Internet; they provide a standard means of interoperation among different software applications running on a variety of platforms and frameworks. However; the underlying technologies used by Web services; such as SOAP; HTTP; and XML; have fostered the deployment of well-known vulnerabilities in this new environment. This system specifically addresses XML injection attacks those that produce some change in the XMLs internal components that aims to compromise the Web service application. This can be achieved by; for instance; injecting malicious content into an XML message; such as invalid XML characters. The classical detection system approach relies on building a signature-based database; cataloging attacks independently from each other. So; the proposed system is an XML injection strategy-based detection system; XHDS; to mitigate the time gap for 0-day attacks resulting from ontologys attack variations. Because many new and unknown attacks are derived from known strategiesconsidered signatureslow false-positive detection rates should occur. This project present XHDS as a hybrid approach that supports knowledge-based detection derived from a signature-based approach and then apply an ontology to design the knowledge database for XML injection attacks against Web services.

Keywords: Signature-based detection systems, Knowledge-based detection techniques, Web services, Ontology, XML Injection

Edition: Volume 3 Issue 5, May 2014

Pages: 1628 - 1631

Share this Article

How to Cite this Article?

Swati Ramesh Kesharwani, Aarti Deshpande, "A Survey On XML-Injection Attack Detection Systems", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=20132051, Volume 3 Issue 5, May 2014, 1628 - 1631

Enter Your Email Address


Similar Articles with Keyword 'Web services'

Downloads: 103

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1886 - 1890

A Flexible and Dynamic Failure Recovery Mechanism for Composite Web Services Using Subset Replacement

Shuchi Gupta, Prof. Praveen Bhanodia

Share this Article

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1362 - 1364

Application Research and Penetration Testing on WebSocket Technology

Priyali Mishra, J. Jeysree

Share this Article

Similar Articles with Keyword 'Ontology'

Downloads: 99

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2297 - 2299

Measuring and Comparing Semantic Structure of Ontology

Nirmitee N. Kurhekar, Prof. L. J. Sankpal

Share this Article

Downloads: 104

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 2435 - 2437

Semantic Information Extraction From Ontology Using Natural Language Query Processing

Sudarshan D. Awale, S. J. Karale

Share this Article

Similar Articles with Keyword 'detection'

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2623 - 2629

Object Detection and Pose Tracking In Augmented Reality

Vipul P.Chauhan, Dr. Manish M. Kayasth

Share this Article

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 948 - 951

Survey on Various Image Segmentation Techniques

Babita Chauhan

Share this Article

Similar Articles with Keyword 'systems'

Downloads: 156

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 338 - 384

Managing Uncertainty in Supply Chain Operating Cost Using Genetic Algorithm

Dr. Niju P. Joseph, Dr. Priyanka Surendran

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 9, September 2021

Pages: 939 - 945

Load Balancing in Cloud Computing Using Optimization Algorithm

Manpreet Kaur, Dr. Amandeep Kaur

Share this Article

Similar Articles with Keyword 'techniques'

Downloads: 108

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1375 - 1390

A Survey of Thinning Techniques on Two Dimensional Binary Images

Moumita Sarkar, Santanu Chatterjee

Share this Article

Downloads: 155 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Similar Articles with Keyword 'Web'

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1240 - 1249

Secure Methods for Supplychain Management to Protect from Attacks in Blockchain

B. Ratnakanth, K. Venkata Ramana

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1717 - 1724

Krashi Prabhandak (Agricultural Manager)

Prafful Mundra, A V Pavan Krishna, Swarnalatha P, Venkata Sumanth Kakollu

Share this Article

Similar Articles with Keyword 'services'

Downloads: 1

Research Proposals or Synopsis, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 705 - 706

An Analysis on Voice Assistant

Shravankumar Jha

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1240 - 1249

Secure Methods for Supplychain Management to Protect from Attacks in Blockchain

B. Ratnakanth, K. Venkata Ramana

Share this Article
Top