2018
DOI: 10.5815/ijcnis.2018.10.01
|View full text |Cite
|
Sign up to set email alerts
|

Verification of Web Content Integrity: Detection and Recovery Security Approach using Colored Petri Nets

Abstract: This paper focuses on the design model verification processes to reduce modification cost after the software is delivered. We proposed a new design flow of web content integrity to protect web security by using colored petri nets simulation. The method covers the design process from the firewall stage to the recovery stage. In the proposed solution, the model verified the integrity of web content through detection tampering and recovery web content processes. Furthermore, the specification formally verifies th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2018
2018
2019
2019

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…Detection is much more important in case of any security threat to protect the hosts [24][25][26][27] from being a victim of ARP spoofing as it leads to many serious attacks on the network. 8 Therefore a detection mechanism [24][25][26][27] is the best solution before considering a prevention mechanism. 8 There are many tools released to detect ARP poisoning attacks in the LAN such as 20 : ARPwner, Ettercap, Window ARP spoofed, and other tools.…”
Section: Detection Approachmentioning
confidence: 99%
See 2 more Smart Citations
“…Detection is much more important in case of any security threat to protect the hosts [24][25][26][27] from being a victim of ARP spoofing as it leads to many serious attacks on the network. 8 Therefore a detection mechanism [24][25][26][27] is the best solution before considering a prevention mechanism. 8 There are many tools released to detect ARP poisoning attacks in the LAN such as 20 : ARPwner, Ettercap, Window ARP spoofed, and other tools.…”
Section: Detection Approachmentioning
confidence: 99%
“…There are two types of countermeasures: detection systems and prevention systems. Detection systems detect the attack by sounding an alarm when an attack is detected, while the prevention system tries to prevent the attack from occurring . For best security measures, both detection and prevention systems should be implemented in the network ,…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation