A novel algorithm to protect code injection attacks

Research output: Book chapter/Published conference paperConference paper

2 Citations (Scopus)

Abstract

The Code Injection Attack (CIA) exploits a security vulnerability or computer bug that is caused by processing invalid data, CIA is a serious attack problem that attackers try to introduce any new methodologies to bypass the defense system. In this paper, we introduce a novel detection algorithm for detection of code injection attack. Our empirical performance shows that the proposed algorithm give better results compared to existing results.
Original languageEnglish
Title of host publicationInternational Conference on Applications and Techniques in Cyber Security and Intelligence - Applications and Techniques in Cyber Security and Intelligence
EditorsJemal Abawajy, Kim-Kwang Raymond Choo, Rafiqul Islam
PublisherSpringer-Verlag London Ltd.
Pages281-292
Number of pages12
Volume580
ISBN (Electronic)9783319670713
ISBN (Print)9783319670706
DOIs
Publication statusPublished - 01 Jan 2018
EventInternational Conference on Applications and Techniques in Cyber Security and Intelligence: ATCSI 2017 - Zhejiang Business Technology Institute, Ningbo, China
Duration: 16 Jun 201718 Jun 2017
http://aibd.us/ (Conference website)
https://www.springer.com/us/book/9783319670706 (Conference proceedings)

Publication series

NameAdvances in Intelligent Systems and Computing
Volume580
ISSN (Print)2194-5357

Conference

ConferenceInternational Conference on Applications and Techniques in Cyber Security and Intelligence
CountryChina
CityNingbo
Period16/06/1718/06/17
OtherThe 2017 International Conference on Applications and Techniques in Cyber Intelligence (ATCI), building on the previous successes in Guangzhou, China (2016), Dallas, USA (2015), Beijing, China (2014), and Sydney, Australia (2013), is proud to be in the 5th consecutive conference year. Previously, the event is known as the International Workshop on Applications and Techniques in Cyber Security (ATCS 2016), held in conjunction with the International Conference on Security and Privacy in Communication Networks (SecureComm).

The 2017 International Conference on Applications and Techniques in Cyber Security and Intelligence focuses on all aspects on techniques and applications in cyber and electronics security and intelligence research. The purpose of ATCI 2017 is to provide a forum for presentation and discussion of innovative ideas, cutting edge research results, and novel techniques, methods and applications on all aspects of cyber and electronics security and intelligence.
Internet address

Cite this

Alnabulsi, H., Islam, R., & Mamun, Q. (2018). A novel algorithm to protect code injection attacks. In J. Abawajy, K-K. R. Choo, & R. Islam (Eds.), International Conference on Applications and Techniques in Cyber Security and Intelligence - Applications and Techniques in Cyber Security and Intelligence (Vol. 580, pp. 281-292). (Advances in Intelligent Systems and Computing; Vol. 580). Springer-Verlag London Ltd.. https://doi.org/10.1007/978-3-319-67071-3_35
Alnabulsi, Hussein ; Islam, Rafiqul ; Mamun, Qazi. / A novel algorithm to protect code injection attacks. International Conference on Applications and Techniques in Cyber Security and Intelligence - Applications and Techniques in Cyber Security and Intelligence. editor / Jemal Abawajy ; Kim-Kwang Raymond Choo ; Rafiqul Islam. Vol. 580 Springer-Verlag London Ltd., 2018. pp. 281-292 (Advances in Intelligent Systems and Computing).
@inproceedings{aab68aeb6f714dd68611cd4e31067941,
title = "A novel algorithm to protect code injection attacks",
abstract = "The Code Injection Attack (CIA) exploits a security vulnerability or computer bug that is caused by processing invalid data, CIA is a serious attack problem that attackers try to introduce any new methodologies to bypass the defense system. In this paper, we introduce a novel detection algorithm for detection of code injection attack. Our empirical performance shows that the proposed algorithm give better results compared to existing results.",
keywords = "Code injection attack, Security, SQL injection attack, XSS attack",
author = "Hussein Alnabulsi and Rafiqul Islam and Qazi Mamun",
year = "2018",
month = "1",
day = "1",
doi = "10.1007/978-3-319-67071-3_35",
language = "English",
isbn = "9783319670706",
volume = "580",
series = "Advances in Intelligent Systems and Computing",
publisher = "Springer-Verlag London Ltd.",
pages = "281--292",
editor = "Jemal Abawajy and Choo, {Kim-Kwang Raymond} and Rafiqul Islam",
booktitle = "International Conference on Applications and Techniques in Cyber Security and Intelligence - Applications and Techniques in Cyber Security and Intelligence",
address = "Germany",

}

Alnabulsi, H, Islam, R & Mamun, Q 2018, A novel algorithm to protect code injection attacks. in J Abawajy, K-KR Choo & R Islam (eds), International Conference on Applications and Techniques in Cyber Security and Intelligence - Applications and Techniques in Cyber Security and Intelligence. vol. 580, Advances in Intelligent Systems and Computing, vol. 580, Springer-Verlag London Ltd., pp. 281-292, International Conference on Applications and Techniques in Cyber Security and Intelligence, Ningbo, China, 16/06/17. https://doi.org/10.1007/978-3-319-67071-3_35

A novel algorithm to protect code injection attacks. / Alnabulsi, Hussein; Islam, Rafiqul; Mamun, Qazi.

International Conference on Applications and Techniques in Cyber Security and Intelligence - Applications and Techniques in Cyber Security and Intelligence. ed. / Jemal Abawajy; Kim-Kwang Raymond Choo; Rafiqul Islam. Vol. 580 Springer-Verlag London Ltd., 2018. p. 281-292 (Advances in Intelligent Systems and Computing; Vol. 580).

Research output: Book chapter/Published conference paperConference paper

TY - GEN

T1 - A novel algorithm to protect code injection attacks

AU - Alnabulsi, Hussein

AU - Islam, Rafiqul

AU - Mamun, Qazi

PY - 2018/1/1

Y1 - 2018/1/1

N2 - The Code Injection Attack (CIA) exploits a security vulnerability or computer bug that is caused by processing invalid data, CIA is a serious attack problem that attackers try to introduce any new methodologies to bypass the defense system. In this paper, we introduce a novel detection algorithm for detection of code injection attack. Our empirical performance shows that the proposed algorithm give better results compared to existing results.

AB - The Code Injection Attack (CIA) exploits a security vulnerability or computer bug that is caused by processing invalid data, CIA is a serious attack problem that attackers try to introduce any new methodologies to bypass the defense system. In this paper, we introduce a novel detection algorithm for detection of code injection attack. Our empirical performance shows that the proposed algorithm give better results compared to existing results.

KW - Code injection attack

KW - Security

KW - SQL injection attack

KW - XSS attack

UR - http://www.scopus.com/inward/record.url?scp=85032693365&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85032693365&partnerID=8YFLogxK

UR - https://www.springerprofessional.de/en/international-conference-on-applications-and-techniques-in-cyber/15153646

UR - http://aibd.us/

U2 - 10.1007/978-3-319-67071-3_35

DO - 10.1007/978-3-319-67071-3_35

M3 - Conference paper

AN - SCOPUS:85032693365

SN - 9783319670706

VL - 580

T3 - Advances in Intelligent Systems and Computing

SP - 281

EP - 292

BT - International Conference on Applications and Techniques in Cyber Security and Intelligence - Applications and Techniques in Cyber Security and Intelligence

A2 - Abawajy, Jemal

A2 - Choo, Kim-Kwang Raymond

A2 - Islam, Rafiqul

PB - Springer-Verlag London Ltd.

ER -

Alnabulsi H, Islam R, Mamun Q. A novel algorithm to protect code injection attacks. In Abawajy J, Choo K-KR, Islam R, editors, International Conference on Applications and Techniques in Cyber Security and Intelligence - Applications and Techniques in Cyber Security and Intelligence. Vol. 580. Springer-Verlag London Ltd. 2018. p. 281-292. (Advances in Intelligent Systems and Computing). https://doi.org/10.1007/978-3-319-67071-3_35