Comprehensive Threat Response Model for the Prevention of Website Intrusion

  • Authors

    • Yong-joon Lee
    • Jeong-min Lee
    • Jin-seob Kim
    • Jae-pyo Park
    2019-01-02
    https://doi.org/10.14419/ijet.v8i1.4.25236
  • Website Intrusion, Website security, cyber attack, threat response, Model
  • The purpose of this study is to verify the effectiveness of a model capable of comprehensive defense against malicious code attacking websites by using technology to cope with website Intrusion. In this study, we suggest a comprehensive response system model against website intrusions with five security functions, for a comprehensive action against the intrusions occurring through websites. The proposed comprehensive response model against website intrusion attacks is designed to make an overall action against malicious codes through the websites using five response techniques, in terms of the following three stages: prevention, detection, and recovery. The proposed five response techniques include web vulnerability pre-checking, the detection of homepage-spread malicious codes, the detection of zombie PC through malicious code address change, the cyber treatment service, and DDoS (Distributed Denial of Service attack) cyber shelter. An empirical experiment was used for the cases of website intrusion attacks to prove that it was possible to make an efficient action. Experimental results show that 12,191 vulnerabilities have been detected through preliminary checks of web vulnerabilities and 2,932,979 zombie PCs have been blocked. We also detected 9,778,683 PCs infected with malicious code and verified the effectiveness of this proposed model.  We expect it will be possible to make effective responses against the intrusion attacks using the comprehensive response system model for websites suggested in this study.

     

     

  • References

    1. [1] Tiago Vieira, Carlos Serrão, “Web Applications Security and Vulnerability Analysis Financial Web Applications Security Audit – A Case Study,†International Journal of Innovative Business Strategies(IJIBS), 3(2), pp.86-94, 2016.

      [2] Kwang-Hyoung Lee, Jae-Pyo Park, "A Software Vulnerability Analysis System using Learning for Source Code Weakness History," Journal of The Korea Academia Industrial cooperation Society, 18(11), pp.46-52, 2017.

      [3] Provos, N., McNamee, D., Mavrommatis ,P., Wang,K. & Modadugu, N. “The ghost in the browser analysis of web-based malware,†In Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets, April, 2007.

      [4] Provos N. , McNamee D., Mavrommatis P., Wang K., & Modadugu N. “The ghost in the browser analysis of web-based malware,†Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets, pp.4-4, April 2007.

      [5] Kwang-Hyoung Lee and Jae-Pyo Park, “A Software Vulnerability Analysis System using Learning for Source Code Weakness History,†Journal of The Korea Academia Industrial cooperation Society, 18(11), pp.46-52, 2017.

      [6] So-Yeon Min, Chan-Suk Jung, Kwang-Hyong Lee, Eun-Sook Cho, Tae-Bok Yoon and Seung-Ho You, “Design of Comprehensive Security Vulnerability Analysis System through Efficient Inspection Method according to Necessity of Upgrading System Vulnerability,†Journal of The Korea Academia Industrial cooperation Society, 18(7), pp.1-8. 2017.

      [7] S. Wagner, D. M. Fernandez, S. Islam, and K. Lochmann, "A Security Requirements Approach for Web Systems", Proceedings of the Quality Assessment in Web (QAW2009), CEUR, 2009.

      [8] Sang-Hwan Oh and Tae-Eun Kim, Hwan-Kuk Kim, “Technology Analysis on Automatic Detection and Defense of SW Vulnerabilities,†Journal of The Korea Academia Industrial cooperation Society, 18(11), pp.94-103, 2017.

      [9] Jae-Hyun Lee, "Study on the OWASP and WASC-oriented Web Application Security," Journal of Advanced Navigation Technology, 15(3), pp.376, Jun. 2011.

      [10] Jae-Chan Moon, "Vulnerability Analysis and Threat Mitigation for Secure Web Application Development," Journal of the Korea Society of Computer and Information, 17(2), pp.133, Feb. 2012

      [11] The Open Web Application Security Project (OWASP), Available Online at http://www.owasp.org. Accessed in Sep. 2011.

      [12] Joonseon Ahn, Byeongmo Chang and Eunyoung Lee,, “Quantitative Scoring System on the Importance of Software Vulnerabilities,†Journal of the Korea Institute of Information Security and Cryptology, 25(4), pp.921-932, 2015.

      [13] Boo Joong Kang, Kyoung Soo Han, Eul Gyu Im, “Malware Current Status and Detection Technology,†Journal of Communications of the Korea Information Science Society, 30(1), pp.44-53, 2012.

      [14] Korea Information & Security Agency(KISA), A method for analyzing malicious code distribution patterns, Research Report, Dec. 2010.

      [15] Korea Information & Security Agency(KISA), October trends, Cyber Security Issue, Dec. 2013.

      [16] Korea Information & Security Agency(KISA), Large-scale Malware distribution trend analysis report, May 2014.

      [17] Korea Information & Security Agency(KISA), Internet Infringement Incident trends and responses in 2014, Feb . 2015.

  • Downloads

  • How to Cite

    Lee, Y.- joon, Lee, J.- min, Kim, J.- seob, & Park, J.- pyo. (2019). Comprehensive Threat Response Model for the Prevention of Website Intrusion. International Journal of Engineering & Technology, 8(1.4), 257-265. https://doi.org/10.14419/ijet.v8i1.4.25236