Pages
55
Words
11,436
Chapters
5
Payment Methods
NOTE: It's highly recommended to before making a purchase to enjoy the benefits as a registered user.
ARCHITECTURAL APPROACH TO FORESTALLING CODE INJECTION ATTACKS
Categories
Table of contents
Table of Contents vi
List of Tables ix
List of Figures x
CHAPTER ONE: Introduction 1
1.0 Background to the Study 1
1.1 Aim and Objective of the Project 2
1.2 Justification 3
1.3 Scope of the Study 3
1.4 Methodology/Research Procedure 3
1.5 Definition of Terms 3
1.6 Organisation of the Project 4
CHAPTER TWO: Literature Review 5
2.1 Vulnerability Analysis and Scanner 5
2.1.1 Limitations of the Vulnerability Scanner 6
2.2 Threat Modelling 7
2.3 Security Perimeter 8
2.4 Threat Classification 9
2.5 SQL Injection 12
2.5.1 SQL Injection Prevention– Intrusion Detection System 13
2.5.2. Static Approach for SQL Injection Countermeasures 14
2.5.3 Dynamic Approach for SQL Injection Countermeasures 15
2.5.4 Hybrid SQLIA Prevention Approach 17
2.5.5 Mutation Based Approach to Detect SQL Injection 18
2.6 XPATH Injection 19
2.7 Session Hijacking 21
CHAPTER THREE 24
3.0 Design and Implementation 24
3.1 Proposed System 24
3.1.1 Advantages of Proposed System 24
3.2 Feasibility Study 24
3.2.1 Economic Feasibility 25
3.2.2 Technical Feasibility 25
3.2.3 Social Feasibility 25
3.3 System Specification 26
3.3.1. Hardware Requirement 26
3.3.2. Software Requirement 26
3.4 Software Description 26
3.4.1 ASP.NET 26
3.4.2. Features of ASP.NET 27
CHAPTER FOUR 28
4.0 Module Description 28
4.1 Authentication Phase 28
4.2 Split Memory Phase 28
4.3 Address space Intrusion Avoidance phase 28
4.4 Preventing Code Injection phase 29
4.5 Data Flow Diagram 29
4.6 Database Design 33
4.6.1 Honey Pot Database 33
4.7 Input Design 35
4.8 Output Design 37
4.9 System Testing 37
4.9.1 Unit Testing 37
4.9.2 Integration Testing 38
4.9.3 Validation Testing 38
4.10 System Implementation 38
CHAPTER FIVE: Conclusion and future Enhancements 40
5.1 Conclusion 40
5.2 Future Enhancements 40
References 41
Appendix 45
LISTS OF TABLES
List Title Pages
4.1 Account Creation 33
4.2 Temporary Transaction 34
4.3 Registration 34
4.4 Hidden Details 34
4.5 Upload 35
Abstract
Code injection attacks, despite being well researched, continue to be a problem today. Modern architectural solutions such as the NX-bit and PaX have been useful in limiting the attacks. However, they enforce program layout restrictions and can often times still be circumvented by a determined attacker.
This study propose a change to the memory architecture of modern processors that addresses the code injection problem at its very root by virtually splitting memory into code memory and data memory such that a processor will never be able to fetch injected code for execution. This virtual split memory system can be implemented as a software only patch to an operating system, and can be used to supplement existing schemes for improved protection.
The experimental results has show that the system is effective in preventing a wide range of code injection attacks while incurring acceptable overhead.
Keywords: Code Injection, Secure Memory Architecture
Please Note:
We represent an esteemed online resource center duly registered with the Corporate Affairs Commission (CAC). Our commitment to integrity and reliability underscores our ethos, ensuring that our services are delivered with utmost trustworthiness. It is our solemn assurance that we conduct our operations with the highest ethical standards, thereby precluding any possibility of deception or fraudulent activities. Guided by our reverence for ethical conduct, we pledge to uphold the principles of honesty and transparency in all our dealings. Rest assured, upon confirmation of your payment, our dedicated team endeavors to promptly furnish you with the requisite project materials within a timeframe of 30 minutes.
We further emphasize that the materials provided are intended for reference purposes, and it is incumbent upon the buyer to adapt and tailor the content to meet their specific requirements. It is imperative to exercise due diligence in ensuring that any utilization of the project or research content is in accordance with academic integrity standards, thus mitigating the risk of plagiarism
Projects are sent in MS word format within 30 minutes - 60 minutes of payment confirmation. For questions and complaints call or WhatsApp: +2348062235854 or +2348166784138
NOTE: By ordering for this material, you have read and agreed with our Terms of use
Payment Methods
NOTE: It's highly recommended to before making a purchase to enjoy the benefits as a registered user.
Feature Project Topics
-
CRITICAL APPRAISAL OF COSTUME AND MAKE-UP IN 2015 LAGOS CARNIVAL: A CASE STUDY OF ISOLO LEGEND
Theater and Performing Arts51
7,383
5
-
ANTIBIOTIC RESISTANCE PATTERN OF MICROORGANISMS ISOLATED FROM INDUSTRIAL WASTE DUMPSITE IN IBADAN, OYO STATE.
Microbiology38
8,080
5
-
ORGANIZATION POLITICS AND TURNOVER INVENTION IN BANKING SECTOR (A CASE STUDY OF GUARANTEE TRUST BANK)
Business Administration64
12,736
5
-
DESIGN OF A MOBILE INFORMATION RETRIEVAL SYSTEM (USING JAVA)
Computer Science52
9,227
5
-
VOCATIONAL PRACTICES AMONG OLABISI ONABANJO UNIVERSITY STUDENTS
Business Education24
4,645
5