Performance Analysis of Internal vs. External Security Mechanism in Web Applications
نویسندگان
چکیده
------------------------------------------------------------------------ABSTRACT-------------------------------------------------------------------Most of the applications now -a-days are developed web based. The applications of public access are highly exposed to security threats. The increasing number of web based attacks which result in loss of data and unauthorized access to application has drawn the attention of organizations toward web application security. The most commonly employed defense mechanism is to use solutions that rely on security service tools like firewalls, intrusion detection and prevention systems etc. Most of the commonly used tools such as SNORT are based upon the payload inspection that detects an attack by searching for the occurrence of known signature patterns in the packet. But using these devices for protecting web applications against common input based attacks is an inefficient process. It consumes a significant amount of time, memory and CPU cycles for each packet while scanning through a list of rules. Implementing security features within applications’ logic is an effective alternative. In this paper we analyz ed the performance of two experimental web applications, one with security implemented within the code and the other checked by external security system called SNORT using a web application testing tool (WAPT 3.0). Our experiment showed that the application with secure code showed better performance statistics in terms of response time. The paper also discusses various issues regarding the use of security devices as protection against application layer attacks.
منابع مشابه
ایجاد نیمه خودکار مشاپ های سازمانی با استفاده از توصیفات معنایی
Mashups are next generation of web applications. A mashup is a lightweight web application that is created by combining information or capabilities from more than one existing resources to deliver a new and integrated experience to the user. Mashups introduce a new class of integration techniques in enterprises for implementing situational applications (i.e. applications that come together to s...
متن کاملThe Effect of Different Attentional Focus on the Penalty Kicking Performance of Adolescent Male Soccer Players in Different Levels
Background. Previous studies have shown that an external versus the internal focus of attention is an effective and efficient method to improve athleteschr('39') performance under anxious conditions. Objectives. The current study aimed to assess the effect of the practice with a distinct focus of attention on the penalty kicking performance of adolescent soccer players with different expertise...
متن کاملsePlugin: Towards Transparently Secure Plugins in Your Internet Explorers
To support a variety of web applications with diverse contents such as video and audio, plugins have been widely adopted to extend the functionality of existing web browsers. Although instrumental for developing web applications efficiently, the open mechanism of plugins poses tremendous threats to browser security. While a plethora of approaches have been proposed to improve the overall securi...
متن کاملPredictive Analysis of Cognitive Errors of Control Room Operators: a Case Study in a Petrochemical Industry
Background and Aims: The aim of this study was to identify and assess human errors in a petrochemical plant using the Technique for the Retrospective and Predictive Analysis of Cognitive Errors (TRACEr). Methods: The sample size was all the eight operators of control room working in four shifts. In the first step, all tasks were analyzed using the hierarchical task analysis in order to identif...
متن کاملA threat risk modeling framework for Geospatial Weather Information System (GWIS) a DREAD based study
Over the years, the focus has been on protecting network, host, database and standard applications from internal and external threats. The Rapid Application Development (RAD) process makes the web application extremely short and makes it difficult to eliminate the vulnerabilities. Here we study web application risk assessment technique called threat risk modeling to improve the security of the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010