Skip to main content

A Novel Algorithm to Protect Code Injection Attacks

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 580))

Abstract

The Code Injection Attack (CIA) exploits a security vulnerability or computer bug that is caused by processing invalid data, CIA is a serious attack problem that attackers try to introduce any new methodologies to bypass the defense system. In this paper, we introduce a novel detection algorithm for detection of code injection attack. Our empirical performance shows that the proposed algorithm give better results compared to existing results.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Qbea’h, M., Alshraideh, M., Sabri, K.E.: Detecting and preventing SQL injection attacks: a formal approach. In: Cybersecurity and Cyberforensics Conference (CCC), pp. 123–129. IEEE, Amman (2016)

    Google Scholar 

  2. Xiao, X., Yan, R., Ye, R., Li, Q., Peng, S., Jiang, Y.: Detection and prevention of code injection attacks on HTML5-based apps. In: Third International Conference on Advanced Cloud and Big Data, pp. 254–26. IEEE, Yangzhou (2015)

    Google Scholar 

  3. Priyaa, D., Devi, I.: Fragmented Query parse tree based SQL injection detection system for web applications. In: International Conference on Computing Technologies and Intelligent Data Engineering (ICCTIDE’16), pp. 1–5. IEEE, Kovilpatti (2016)

    Google Scholar 

  4. Zhao, Z., Ahn, G.: Using instruction sequence abstraction for shellcode detection and attribution. In: Conference on Communications and Network Security (CNS), pp. 323–331. IEEE, National Harbor, MD (2013)

    Google Scholar 

  5. Qu, B., Liang, B., Jiang, S., Ye, C.: Design of automatic vulnerability detection system for web application program. In: 4th International Conference on Software Engineering and Service Science, pp. 89–92. IEEE, Beijing (2013)

    Google Scholar 

  6. Priyaa, D., Devi, I.: Hybrid SQL injection detection system. In: 3rd International Conference on Advanced Computing and Communication Systems (ICACCS), pp. 1–5. IEEE, Coimbatore (2016)

    Google Scholar 

  7. Wikipedia. https://en.wikipedia.org/wiki/File_inclusion_vulnerability

  8. Alnabulsi, H., Islam, R., Mamun, Q.: Detecting SQL injection attacks using SNORT IDS. In: Asia-Pacific World Congress on Computer Science and Engineering Conference, pp. 1–7. IEEE, Nadi (2014)

    Google Scholar 

  9. OWASP. https://www.owasp.org/index.php/XSS_Filter_Evasion_Cheat_Sheet

  10. HTTP DATASET CSIC 2010. http://www.isi.csic.es/dataset/

  11. Our Favorite XSS Filters/IDS and how to Attack Them. http://www.blackhat.com/presentations/bh-usa-09/VELANAVA/BHUSA09-VelaNava-FavoriteXSS-SLIDES.pdf

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hussein Alnabulsi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Alnabulsi, H., Islam, R., Mamun, Q. (2018). A Novel Algorithm to Protect Code Injection Attacks. In: Abawajy, J., Choo, KK., Islam, R. (eds) International Conference on Applications and Techniques in Cyber Security and Intelligence. ATCI 2017. Advances in Intelligent Systems and Computing, vol 580. Edizioni della Normale, Cham. https://doi.org/10.1007/978-3-319-67071-3_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-67071-3_35

  • Published:

  • Publisher Name: Edizioni della Normale, Cham

  • Print ISBN: 978-3-319-67070-6

  • Online ISBN: 978-3-319-67071-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics