Abstract:

The proposed system provides efficient fingerprinting methods to prevent the attacks. Also the proposed system provides security against application as well. If the firewall is been compromised, intruder cannot access the files in the application or server because application is made secure against most common web vulnerabilities. The application security is achieved using web vulnerability scanner which scans all the scripts used inside the application for vulnerability injection scripts (CSRF and SQL injection). The proposed system of firewall fingerprinting methods can achieve quite high accuracy against all web vulnerability. All web applications can be made secure against web attacks. Firewalls are most important and critical devices which provide securities against all vulnerabilities. Firewall handles all the traffic in and out of the network. Hackers / intruders exploit the firewall using malicious scripts and access the server / applications. Analyze Denial of Firewalling and SQL injection attacks are discussed. Denial of Firewalling is attacker overloads the firewall and SQL injection is bypassing the security protocol by malicious scripts. Firewalls are most important and critical devices which provide securities against all vulnerabilities. Firewall handles all the traffic in and out of the network. Hackers / intruders exploit the firewall using malicious scripts and access the server / applications. Analyze Denial of Firewalling and SQL injection attacks are discussed. Denial of Firewalling is attacker overloads the firewall and SQL injection is bypassing the security protocol by malicious scripts.


Keywords: SQL injection, CSRF, Firewalls, Security Protocol, Vulnerabilities, Intruder.;