Modsecurity Research Papers - Academia.edu (original) (raw)
0 Followers
Recent papers in Modsecurity
We live in a period of time where Information Security has gained much attention. The core purpose of the paper is to critically study and analyze the trends in information security as far as the Internet is concerned. To counter the ever... more
We live in a period of time where Information
Security has gained much attention. The core
purpose of the paper is to critically study and
analyze the trends in information security as far as
the Internet is concerned. To counter the ever rising
rates of cyber-crimes, the researcher has come up
with a system that scans any target website for the
most highly exploited security loophole. The system
is a web application that is mainly targeted towards
web developers so as to reduce the burden of
security mechanism enforcement on them, while
developing web content. This, in turn, makes the
web a much safer and secure place to exist.
The ideas and techniques of the DoS / DDoS Attack strategy become more effective and more complex. In our research, we focus on a Slow Read DoS Attack which is one of the sophisticated DoS attack techniques. This technique prolongs time... more
The ideas and techniques of the DoS / DDoS Attack
strategy become more effective and more complex.
In our research, we focus on a Slow Read DoS
Attack which is one of the sophisticated DoS attack
techniques. This technique prolongs time to read the
response from the Web server, although an attacker
sends a legitimate HTTP request. When an attacker
sends many legitimate requests, he can keep many
open connections to Web server and eventually
cause DoS situation. In this paper, we analyze the
effectiveness of the Slow Read DoS Attack using
the virtual environment. As a result, we found that
the Slow Read DoS Attack by a single attacker can
be prevented by adequate security settings of Web
server and applying countermeasure such as
ModSecurity. However, from the analysis of the
Slow Read DoS Attack technique, we can also find
that these countermeasures are not effective against
distributed Slow Read DoS Attack (Slow Read
DDoS Attack) which is proposed in this paper.