Log visualization of intrusion and prevention reverse proxy server against web attacks

SQL Injection Attack (SQLIA) has made to the top of the OWASP, Top 10 Web Application Security Risks in 2013 and in 2010. The explosive use of web application with very little emphasis lay on securing it make this attack becoming more popular. Various methods have been discussed and propos...

Full description

Bibliographic Details
Main Authors: Mantoro, Teddy, Abdul Aziz, Normaziah, Meor Yusof, Nur Dalilah, Abu Talib, Nor Aishah
Format: Proceeding Paper
Language:English
Published: IEEE 2013
Subjects:
Online Access:http://irep.iium.edu.my/35416/
http://irep.iium.edu.my/35416/1/06702833.pdf
_version_ 1848781050323402752
author Mantoro, Teddy
Abdul Aziz, Normaziah
Meor Yusof, Nur Dalilah
Abu Talib, Nor Aishah
author_facet Mantoro, Teddy
Abdul Aziz, Normaziah
Meor Yusof, Nur Dalilah
Abu Talib, Nor Aishah
author_sort Mantoro, Teddy
building IIUM Repository
collection Online Access
description SQL Injection Attack (SQLIA) has made to the top of the OWASP, Top 10 Web Application Security Risks in 2013 and in 2010. The explosive use of web application with very little emphasis lay on securing it make this attack becoming more popular. Various methods have been discussed and proposed as countermeasure to the attack. Unfortunately, most of them are seen to be not comprehensive enough to address any kind of issues an organization might have when it comes to hardening the web security such as technical and financial matter for instance. This study presents a way to prevent and detect intrusion through the deployment of reverse proxy with an intrusion and prevention mechanism built in against web attacks especially SQLIA. With the flexibility offered in server logging process, we obtain and analyse preferred data to visualize the type of attack based on logs information. Our graph visualization development monitors three web security aspects, i.e. the top traffic blocked attempted by IP address, number of regular expression rules violated and detect the rules of intrusion detection.
first_indexed 2025-11-14T15:43:24Z
format Proceeding Paper
id iium-35416
institution International Islamic University Malaysia
institution_category Local University
language English
last_indexed 2025-11-14T15:43:24Z
publishDate 2013
publisher IEEE
recordtype eprints
repository_type Digital Repository
spelling iium-354162016-06-05T19:25:46Z http://irep.iium.edu.my/35416/ Log visualization of intrusion and prevention reverse proxy server against web attacks Mantoro, Teddy Abdul Aziz, Normaziah Meor Yusof, Nur Dalilah Abu Talib, Nor Aishah T10.5 Communication of technical information SQL Injection Attack (SQLIA) has made to the top of the OWASP, Top 10 Web Application Security Risks in 2013 and in 2010. The explosive use of web application with very little emphasis lay on securing it make this attack becoming more popular. Various methods have been discussed and proposed as countermeasure to the attack. Unfortunately, most of them are seen to be not comprehensive enough to address any kind of issues an organization might have when it comes to hardening the web security such as technical and financial matter for instance. This study presents a way to prevent and detect intrusion through the deployment of reverse proxy with an intrusion and prevention mechanism built in against web attacks especially SQLIA. With the flexibility offered in server logging process, we obtain and analyse preferred data to visualize the type of attack based on logs information. Our graph visualization development monitors three web security aspects, i.e. the top traffic blocked attempted by IP address, number of regular expression rules violated and detect the rules of intrusion detection. IEEE 2013 Proceeding Paper PeerReviewed application/pdf en http://irep.iium.edu.my/35416/1/06702833.pdf Mantoro, Teddy and Abdul Aziz, Normaziah and Meor Yusof, Nur Dalilah and Abu Talib, Nor Aishah (2013) Log visualization of intrusion and prevention reverse proxy server against web attacks. In: International Conference on Informatics and Creative Multimedia (ICICM), 2013, 4-6 September 2013, Kuala Lumpur, Malaysia. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6702833
spellingShingle T10.5 Communication of technical information
Mantoro, Teddy
Abdul Aziz, Normaziah
Meor Yusof, Nur Dalilah
Abu Talib, Nor Aishah
Log visualization of intrusion and prevention reverse proxy server against web attacks
title Log visualization of intrusion and prevention reverse proxy server against web attacks
title_full Log visualization of intrusion and prevention reverse proxy server against web attacks
title_fullStr Log visualization of intrusion and prevention reverse proxy server against web attacks
title_full_unstemmed Log visualization of intrusion and prevention reverse proxy server against web attacks
title_short Log visualization of intrusion and prevention reverse proxy server against web attacks
title_sort log visualization of intrusion and prevention reverse proxy server against web attacks
topic T10.5 Communication of technical information
url http://irep.iium.edu.my/35416/
http://irep.iium.edu.my/35416/
http://irep.iium.edu.my/35416/1/06702833.pdf