Analyzing web application vulnerability tests using Firewall/Intrusion Detection System
This study investigates web application vulnerabilities by analyzing attacks through the use of firewall and Intrusion Detection System (IDS). The attacks that were used to test against web services in this study includes reconnaissance attacks such as Ping Sweeping and TCP SYN port scanning, access...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
2013
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/52559 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-52559 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-525592023-03-03T20:25:51Z Analyzing web application vulnerability tests using Firewall/Intrusion Detection System Neoh, Jia Wen. Lau Chiew Tong School of Computer Engineering Temasek Laboratories DRNTU::Engineering::Computer science and engineering::Theory of computation::Analysis of algorithms and problem complexity This study investigates web application vulnerabilities by analyzing attacks through the use of firewall and Intrusion Detection System (IDS). The attacks that were used to test against web services in this study includes reconnaissance attacks such as Ping Sweeping and TCP SYN port scanning, access attack such as SQL Injection, and denial-of-service attack such as TCP flooding. This study uses an open-source firewall, Vyatta VC6.4, which is bundled with packet analyzer, WireShark, and IDS, SNORT. Its main function is to perform proactive and reactive security functions to protect the Apache 2.0 web server within its internal network. Malicious packets that attempt to reach the web server are analyzed by the packet analyzer. Profile and characteristics are then derived from the observations done in the analysis. These profiles will then be used to design and implement an analysis framework. The author assumes two roles in this study; a hacker and administrator. The author follows the appropriate steps that an attacker would undertake to infiltrate the web server. This is done by launching host discovery attack first, followed by service discovery attack, and then either access attack to by-pass authentication service, or denial-of-service attack to take down the web server. All attacks conducted in this study are done in a controlled virtual environment running on VMware. As this study involves various attacks, the resulting analysis and framework for each attack differs from one another. Hence, the experiments of each attack are carried out independently, forming a chapter of its own. The analysis of each chapter is presented in tables and figures format within their own respective sections. With independent observations and analysis gathered from the different chapters, the author proposed an analysis framework that could effectively assist the analysis of web vulnerability attacks. Bachelor of Engineering (Computer Engineering) 2013-05-17T03:34:42Z 2013-05-17T03:34:42Z 2013 2013 Final Year Project (FYP) http://hdl.handle.net/10356/52559 en Nanyang Technological University 73 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Engineering::Computer science and engineering::Theory of computation::Analysis of algorithms and problem complexity |
spellingShingle |
DRNTU::Engineering::Computer science and engineering::Theory of computation::Analysis of algorithms and problem complexity Neoh, Jia Wen. Analyzing web application vulnerability tests using Firewall/Intrusion Detection System |
description |
This study investigates web application vulnerabilities by analyzing attacks through the use of firewall and Intrusion Detection System (IDS). The attacks that were used to test against web services in this study includes reconnaissance attacks such as Ping Sweeping and TCP SYN port scanning, access attack such as SQL Injection, and denial-of-service attack such as TCP flooding.
This study uses an open-source firewall, Vyatta VC6.4, which is bundled with packet analyzer, WireShark, and IDS, SNORT. Its main function is to perform proactive and reactive security functions to protect the Apache 2.0 web server within its internal network. Malicious packets that attempt to reach the web server are analyzed by the packet analyzer. Profile and characteristics are then derived from the observations done in the analysis. These profiles will then be used to design and implement an analysis framework.
The author assumes two roles in this study; a hacker and administrator. The author follows the appropriate steps that an attacker would undertake to infiltrate the web server. This is done by launching host discovery attack first, followed by service discovery attack, and then either access attack to by-pass authentication service, or denial-of-service attack to take down the web server. All attacks conducted in this study are done in a controlled virtual environment running on VMware.
As this study involves various attacks, the resulting analysis and framework for each attack differs from one another. Hence, the experiments of each attack are carried out independently, forming a chapter of its own. The analysis of each chapter is presented in tables and figures format within their own respective sections. With independent observations and analysis gathered from the different chapters, the author proposed an analysis framework that could effectively assist the analysis of web vulnerability attacks. |
author2 |
Lau Chiew Tong |
author_facet |
Lau Chiew Tong Neoh, Jia Wen. |
format |
Final Year Project |
author |
Neoh, Jia Wen. |
author_sort |
Neoh, Jia Wen. |
title |
Analyzing web application vulnerability tests using Firewall/Intrusion Detection System |
title_short |
Analyzing web application vulnerability tests using Firewall/Intrusion Detection System |
title_full |
Analyzing web application vulnerability tests using Firewall/Intrusion Detection System |
title_fullStr |
Analyzing web application vulnerability tests using Firewall/Intrusion Detection System |
title_full_unstemmed |
Analyzing web application vulnerability tests using Firewall/Intrusion Detection System |
title_sort |
analyzing web application vulnerability tests using firewall/intrusion detection system |
publishDate |
2013 |
url |
http://hdl.handle.net/10356/52559 |
_version_ |
1759853366810247168 |