An Approach for Detecting Web Defacement with Self-healing Capabilities

  • Mfundo Masango
  • Francois Mouton
  • Palesa Antony
  • Bokang Mangoale
Chapter
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10830)

Abstract

Websites have become a form of information distribution; usage of websites has seen a significant rise in the amount of information circulated on the Internet. Some businesses have created websites that display services the business renders or information about that particular product; businesses make use of the Internet to expand business opportunities or advertise the services they render on a global scale. This does not only apply to businesses. Other entities such as celebrities, socialites, bloggers and vloggers are using the Internet to expand personal or business opportunities too. These entities make use of websites that are hosted by a web host. The contents of the website is stored on a web server. However, not all websites undergo penetration testing which leads to them being vulnerable. Penetration testing is a costly exercise that most companies or website owners find they cannot afford. With web defacement still one of the most common attacks on websites, these attacks aim at altering the content of the web pages or to make the website inactive. This paper proposes a Web Defacement and Intrusion Monitoring Tool that could be a possible solution to the rapid identification of altered or deleted web pages. The proposed tool has web defacement detection capabilities that may be used for intrusion detection as well. The proposed solution will also be used to regenerate the original content of a website, after the website has been defaced.

Keywords

Commands Intrusion detection Self-healing Web defacement Web monitoring 

References

  1. [PE1]
    Perez, T.: Why websites get hacked. Sucuri Inc. (2015). https://blog.sucuri.net/2015/02/why-websites-get-hacked.html
  2. [LE1]
    Lyon, J.: What are the 5 most common attacks on websites? Quora (2014). https://www.quora.com/What-are-the-5-most-common-attacks-on-websites
  3. [CE1]
    Cybercrime.org.za: Website defacement definition. ISC AFRICA (2016). https://cybercrime.org.za/website-defacement
  4. [DE1]
    Davanzo, G., Medvet, E., Bartoli, A.: Anomaly detection techniques for a web defacement monitoring service. Expert Syst. Appl. 38(10), 12521–12530 (2011)CrossRefGoogle Scholar
  5. [KE1]
    Kanti, T., Richariya, V., Richariya, V.: Implementing a Web browser with Web defacement detection techniques. World Comput. Sci. Inf. Tech. J. (WCSIT) 1(7), 307–310 (2011)Google Scholar
  6. [ME1]
    Medvet, E., Fillon, C., Bartoli, A.: Detection of web defacements by means of genetic programming. In: Third International Symposium on Information Assurance and Security, IAS 2007, pp. 227–234. IEEE (2007)Google Scholar
  7. [BE1]
    Bartoli, A., Davanzo, G., Medvet, E.: The reaction time to Web site defacements. IEEE Internet Comput. 13, 4 (2009)CrossRefGoogle Scholar
  8. [MEL1]
    Ninja86 L: What is the difference between webpage, website, web server, and search engine? Mozilla Developer Network (2017). https://developer.mozilla.org/en-US/docs/Learn/Common-questions/Pages-sites-servers-and-search-engines
  9. [AE1]
    Ali, A.B.M., Abdullah, M.S., Alostad, J., et al.: SQL-injection vulnerability scanning tool for automatic creation of SQL-injection attacks. Procedia Comput. Sci. 3, 453–458 (2011)CrossRefGoogle Scholar
  10. [MO1]
    Morgan, D.: Web injection attacks. Netw. Secur. 3, 8–10 (2006)CrossRefGoogle Scholar
  11. [ZO1]
    Zone-H: zone-h.org. Zone-H (2017). http://www.zone-h.org/stats/ymd
  12. [KE1]
    Woonyon, K., Jeongmoon, L., Eungki, P., Sangwook, K.: Advanced mechanism for reducing false alarm rate in web page defacement detection. In: The 7th International Workshop on Information Security Applications (2006)Google Scholar
  13. [HE1]
    Huang, Y., Sood, A., Bhaskar Ravi, K.: Countering web defacing attacks with system self-cleansing. In: Proceedings of 7th Word Multiconference on Systemics, Cybernetics and Informatics, pp. 12–16 (2003)Google Scholar

Copyright information

© Springer-Verlag GmbH Germany, part of Springer Nature 2018

Authors and Affiliations

  • Mfundo Masango
    • 1
  • Francois Mouton
    • 1
  • Palesa Antony
    • 1
  • Bokang Mangoale
    • 1
  1. 1.Command, Control and Information Warfare, Defence, Peace, Safety and SecurityCouncil for Scientific and Industrial ResearchPretoriaSouth Africa

Personalised recommendations