Open Access iconOpen Access

ARTICLE

crossmark

Web Attack Detection Using the Input Validation Method: DPDA Theory

Osamah Ibrahim Khalaf1, Munsif Sokiyna2,*, Youseef Alotaibi3, Abdulmajeed Alsufyani4, Saleh Alghamdi5

1 Al-Nahrain University, Al-Nahrain Nano Renewable Energy Research Center, Baghdad, Iraq
2 Department of Management Information Systems, Faculty of Science & Information Technology, Cyprus International University, Nicosia, Cyprus
3 Department of Computer Science, College of Computers and Information Systems, Umm Al-Qura University, Makkah, Saudi Arabia
4 Department of Computer Science, College of Computers and Information Technology, Taif University, Taif, 21944, Saudi Arabia
5 Department of Information Technology College of Computers and Information Technology, Taif University, Taif, 21944, Saudi Arabia

* Corresponding Author: Munsif Sokiyna. Email:

Computers, Materials & Continua 2021, 68(3), 3167-3184. https://doi.org/10.32604/cmc.2021.016099

Abstract

A major issue while building web applications is proper input validation and sanitization. Attackers can quickly exploit errors and vulnerabilities that lead to malicious behavior in web application validation operations. Attackers are rapidly improving their capabilities and technologies and now focus on exploiting vulnerabilities in web applications and compromising confidentiality. Cross-site scripting (XSS) and SQL injection attack (SQLIA) are attacks in which a hacker sends malicious inputs (cheat codes) to confuse a web application, to access or disable the application’s back-end without user awareness. In this paper, we explore the problem of detecting and removing bugs from both client-side and server-side code. A new idea that allows assault detection and prevention using the input validation mechanism is introduced. In addition, the project supports web security tests by providing easy-to-use and accurate models of vulnerability prediction and methods for validation. If these attributes imply a program statement that is vulnerable in an SQLIA, this can be evaluated and checked for a set of static code attributes. Additionally, we provide a script whitelisting interception layer built into the browser’s JavaScript engine, where the SQLIA is eventually detected and the XSS attack resolved using the method of input validation and script whitelisting under pushdown automatons. This framework was tested under a scenario of an SQL attack and XSS. It is demonstrated to offer an extensive improvement over the current framework. The framework’s main ability lies in the decrease of bogus positives. It has been demonstrated utilizing new methodologies, nevertheless giving unique access to sites dependent on the peculiarity score related to web demands. Our proposed input validation framework is shown to identify all anomalies and delivers better execution in contrast with the current program.

Keywords


Cite This Article

APA Style
Khalaf, O.I., Sokiyna, M., Alotaibi, Y., Alsufyani, A., Alghamdi, S. (2021). Web attack detection using the input validation method: DPDA theory. Computers, Materials & Continua, 68(3), 3167-3184. https://doi.org/10.32604/cmc.2021.016099
Vancouver Style
Khalaf OI, Sokiyna M, Alotaibi Y, Alsufyani A, Alghamdi S. Web attack detection using the input validation method: DPDA theory. Comput Mater Contin. 2021;68(3):3167-3184 https://doi.org/10.32604/cmc.2021.016099
IEEE Style
O.I. Khalaf, M. Sokiyna, Y. Alotaibi, A. Alsufyani, and S. Alghamdi, “Web Attack Detection Using the Input Validation Method: DPDA Theory,” Comput. Mater. Contin., vol. 68, no. 3, pp. 3167-3184, 2021. https://doi.org/10.32604/cmc.2021.016099

Citations




cc Copyright © 2021 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 4347

    View

  • 1704

    Download

  • 0

    Like

Share Link