Analyzing web application vulnerability tests using Firewall/Intrusion Detection System

This study investigates web application vulnerabilities by analyzing attacks through the use of firewall and Intrusion Detection System (IDS). The attacks that were used to test against web services in this study includes reconnaissance attacks such as Ping Sweeping and TCP SYN port scanning, access...

Full description

Bibliographic Details
Main Author: Neoh, Jia Wen.
Other Authors: Lau Chiew Tong
Format: Final Year Project (FYP)
Language:English
Published: 2013
Subjects:
Online Access:http://hdl.handle.net/10356/52559
_version_ 1811677960292270080
author Neoh, Jia Wen.
author2 Lau Chiew Tong
author_facet Lau Chiew Tong
Neoh, Jia Wen.
author_sort Neoh, Jia Wen.
collection NTU
description This study investigates web application vulnerabilities by analyzing attacks through the use of firewall and Intrusion Detection System (IDS). The attacks that were used to test against web services in this study includes reconnaissance attacks such as Ping Sweeping and TCP SYN port scanning, access attack such as SQL Injection, and denial-of-service attack such as TCP flooding. This study uses an open-source firewall, Vyatta VC6.4, which is bundled with packet analyzer, WireShark, and IDS, SNORT. Its main function is to perform proactive and reactive security functions to protect the Apache 2.0 web server within its internal network. Malicious packets that attempt to reach the web server are analyzed by the packet analyzer. Profile and characteristics are then derived from the observations done in the analysis. These profiles will then be used to design and implement an analysis framework. The author assumes two roles in this study; a hacker and administrator. The author follows the appropriate steps that an attacker would undertake to infiltrate the web server. This is done by launching host discovery attack first, followed by service discovery attack, and then either access attack to by-pass authentication service, or denial-of-service attack to take down the web server. All attacks conducted in this study are done in a controlled virtual environment running on VMware. As this study involves various attacks, the resulting analysis and framework for each attack differs from one another. Hence, the experiments of each attack are carried out independently, forming a chapter of its own. The analysis of each chapter is presented in tables and figures format within their own respective sections. With independent observations and analysis gathered from the different chapters, the author proposed an analysis framework that could effectively assist the analysis of web vulnerability attacks.
first_indexed 2024-10-01T02:45:40Z
format Final Year Project (FYP)
id ntu-10356/52559
institution Nanyang Technological University
language English
last_indexed 2024-10-01T02:45:40Z
publishDate 2013
record_format dspace
spelling ntu-10356/525592023-03-03T20:25:51Z Analyzing web application vulnerability tests using Firewall/Intrusion Detection System Neoh, Jia Wen. Lau Chiew Tong School of Computer Engineering Temasek Laboratories DRNTU::Engineering::Computer science and engineering::Theory of computation::Analysis of algorithms and problem complexity This study investigates web application vulnerabilities by analyzing attacks through the use of firewall and Intrusion Detection System (IDS). The attacks that were used to test against web services in this study includes reconnaissance attacks such as Ping Sweeping and TCP SYN port scanning, access attack such as SQL Injection, and denial-of-service attack such as TCP flooding. This study uses an open-source firewall, Vyatta VC6.4, which is bundled with packet analyzer, WireShark, and IDS, SNORT. Its main function is to perform proactive and reactive security functions to protect the Apache 2.0 web server within its internal network. Malicious packets that attempt to reach the web server are analyzed by the packet analyzer. Profile and characteristics are then derived from the observations done in the analysis. These profiles will then be used to design and implement an analysis framework. The author assumes two roles in this study; a hacker and administrator. The author follows the appropriate steps that an attacker would undertake to infiltrate the web server. This is done by launching host discovery attack first, followed by service discovery attack, and then either access attack to by-pass authentication service, or denial-of-service attack to take down the web server. All attacks conducted in this study are done in a controlled virtual environment running on VMware. As this study involves various attacks, the resulting analysis and framework for each attack differs from one another. Hence, the experiments of each attack are carried out independently, forming a chapter of its own. The analysis of each chapter is presented in tables and figures format within their own respective sections. With independent observations and analysis gathered from the different chapters, the author proposed an analysis framework that could effectively assist the analysis of web vulnerability attacks. Bachelor of Engineering (Computer Engineering) 2013-05-17T03:34:42Z 2013-05-17T03:34:42Z 2013 2013 Final Year Project (FYP) http://hdl.handle.net/10356/52559 en Nanyang Technological University 73 p. application/pdf
spellingShingle DRNTU::Engineering::Computer science and engineering::Theory of computation::Analysis of algorithms and problem complexity
Neoh, Jia Wen.
Analyzing web application vulnerability tests using Firewall/Intrusion Detection System
title Analyzing web application vulnerability tests using Firewall/Intrusion Detection System
title_full Analyzing web application vulnerability tests using Firewall/Intrusion Detection System
title_fullStr Analyzing web application vulnerability tests using Firewall/Intrusion Detection System
title_full_unstemmed Analyzing web application vulnerability tests using Firewall/Intrusion Detection System
title_short Analyzing web application vulnerability tests using Firewall/Intrusion Detection System
title_sort analyzing web application vulnerability tests using firewall intrusion detection system
topic DRNTU::Engineering::Computer science and engineering::Theory of computation::Analysis of algorithms and problem complexity
url http://hdl.handle.net/10356/52559
work_keys_str_mv AT neohjiawen analyzingwebapplicationvulnerabilitytestsusingfirewallintrusiondetectionsystem