Towards an Automatic Generation of Low-Interaction Web Application Honeypots

Author(s):  
Marius Musch ◽  
Martin Härterich ◽  
Martin Johns
Author(s):  
Humberto Cortés ◽  
Antonio Navarro

Nowadays, the Unified Modeling Language (UML) is the most successful notation for the design of object-oriented applications. However, plain UML is not enough to characterize the web presentation tier of enterprise applications, including the navigational, structural and role-based access control (RBAC) features present in these applications. In this paper, we present Enterprise Web Application Extension (E-WAE), a lightweight UML extension for the modeling of these elements, which permits the inclusion of multitier, Service-Oriented Architecture (SOA) and security design-level patterns in the models. Our approach follows a Model-Driven Development (MDD) approach, which enables the automatic generation of intermediate platform-specific models and automatic code generation for JavaServer Faces (JSF) and Active Server Pages.NET Model-View-Controller (ASP.NET MVC) frameworks. In addition, this generated code can be used as a low-cost mockup for early client validation of the navigational, structural and RBAC features of enterprise applications. E-WAE has been used with different applications. In this paper, we refer to the checkout process in the Amazon website, the delete resources use case in OdAJ2EE, an educational application developed by us, and the US Library of Congress Online Catalog search facility as examples of its applicability.


2019 ◽  
Vol 8 (2S11) ◽  
pp. 3721-3724

With the invention of deep learning, there is a good progress in image classification. But automatic generation of captions for images is still a challenging problem and is in the initial stages of artificial intelligence research. Automatic description of images has applications in social networking and will be useful to visually impaired persons. This paper concentrates on designing a user-friendly web application framework which can predict the caption of an image using deep learning techniques. The verbs and objects present in the caption are used for forming the emoji and for predicting the major color of the image


2015 ◽  
Vol 6 (3) ◽  
pp. 50-64 ◽  
Author(s):  
Bouchaib Falah ◽  
Mohammed Akour ◽  
Samia Oukemeni

In modern interaction, web applications has gained more and more popularity, which leads to a significate growth of exposure to malicious users and vulnerability attacks. This causes organizations and companies to lose valuable information and suffer from bad reputation. One of the effective mitigation practices is to perform security testing against the application before release it to the market. This solution won't protect web application 100% but it will test the application against malicious codes and reduce the high number of potential attacks on web application. One of known security testing approach is threat modeling, which provides an efficient technique to identify threats that can compromise system security. The authors proposed method, in this paper, focuses on improving the effectiveness of the categorization of threats by using Open 10 Web Application Security Project's (OWASP) that are the most critical web application security risks in generating threat trees in order to cover widely known security attacks.


Author(s):  
Pavel Turčínek ◽  
Arnošt Motyčka

Accession of the Internet undoubtedly has contributed to the shift of marketing activities. With the increasing availability and wealth of online information customers become more knowledgeable and sophisticated. If a company wants to keep its customers in long term, it must offer something more than an “ordinary” product, which has comparable substitutes in tens of other companies.At first it is necessary to identify customers behavior and thinking. Observation of his/her preferences of a demanded product line discovers products playing the key role from his/her point of view. We use methodical tools for this purpose e.g. CRM systems, Business Intelligence etc. Over gained metrics from data in data warehouses (observation subsystem) we make evaluations according to various criteria (subsystem of evaluation). In this report we methodically open up not just e.g. data mining technologies, but also based on aggregated data we infer e.g. consumer’s trends.The goal of the article is to point out suitable instruments which enable to create interaction with customers, where they’ll be able to participate in creation products of their own. The Internet seems as a perfect communication channel for this interaction. Web application will consist of solution of an observation subsystem as a database application and of evaluation subsystem as the application of a row of methods e.g. multicriteria evaluation. Web applications feedback effect leads into knowledge of selected customer’s characteristics, which enables to offer him/her among others a special line of standard products.By creating a disposable web application it’s possible e.g. to offer customers absolutely common products with different visual angle. Thanks to gained information and knowledge we divide customers into groups and then target on them specifically.


Author(s):  
Bouchaib Falah ◽  
Mohammed Akour ◽  
Samia Oukemeni

In modern interaction, web applications has gained more and more popularity, which leads to a significate growth of exposure to malicious users and vulnerability attacks. This causes organizations and companies to lose valuable information and suffer from bad reputation. One of the effective mitigation practices is to perform security testing against the application before release it to the market. This solution won't protect web application 100% but it will test the application against malicious codes and reduce the high number of potential attacks on web application. One of known security testing approach is threat modeling, which provides an efficient technique to identify threats that can compromise system security. The authors proposed method, in this paper, focuses on improving the effectiveness of the categorization of threats by using Open 10 Web Application Security Project's (OWASP) that are the most critical web application security risks in generating threat trees in order to cover widely known security attacks.


2015 ◽  
Vol 2015 ◽  
pp. 1-11 ◽  
Author(s):  
Sebastian Carrasco Pro ◽  
John Sidney ◽  
Sinu Paul ◽  
Cecilia Lindestam Arlehamn ◽  
Daniela Weiskopf ◽  
...  

Accurate measurement of B and T cell responses is a valuable tool to study autoimmunity, allergies, immunity to pathogens, and host-pathogen interactions and assist in the design and evaluation of T cell vaccines and immunotherapies. In this context, it is desirable to elucidate a method to select validated reference sets of epitopes to allow detection of T and B cells. However, the ever-growing information contained in the Immune Epitope Database (IEDB) and the differences in quality and subjects studied between epitope assays make this task complicated. In this study, we develop a novel method to automatically select reference epitope sets according to a categorization system employed by the IEDB. From the sets generated, three epitope sets (EBV, mycobacteria and dengue) were experimentally validated by detection of T cell reactivityex vivofrom human donors. Furthermore, a web application that will potentially be implemented in the IEDB was created to allow users the capacity to generate customized epitope sets.


2008 ◽  
Vol 5 (1) ◽  
pp. 61-85 ◽  
Author(s):  
Katarina Belic ◽  
Dusan Surla

Aim of the research is to model the system for cataloguing in the UNIMARC format which does not require specific knowledge of cataloguing formats. The Unified Modeling Language (UML 2.0) is used for the specification of both the information requirements and the architecture model of system for cataloguing. The research finding is a model of system for cataloguing in UNIMARC format by which authors themselves can process their bibliographic entries without knowing UNIMARC format. Bibliographic records formed in this way can be further processed according to adopted standards by librarians. Limitation of research results lies in the additional modeling of graphic user interface for the purpose of changing input data set of library documents. This limitation can be surpassed by specifying the input data set which would be used for automatic generation of appropriate user interface. The specification could be realized by means of XML Schema language. Practical usage of the research findings is the basic for the implementation of a Web application intended for the creation of electronic catalogues and bibliographies of researchers and scientific institutions. Integration of the catalogue into BISIS makes it publicly available through a standard user interface for searching bibliographic records on the Internet. In addition that application could be integrated into various librarian software systems. The contribution of this work is in the model architecture of the system for cataloguing in the UNIMARC format. User interface (described by use case diagrams) is connected with object model of UNIMARC format. According to that, any change or addition of new input data set of library documents requires only the change of use case diagrams which describe user interface while the rest of the model remains the same.


2009 ◽  
Vol 2009 ◽  
pp. 1-16
Author(s):  
Quan Liang Chen ◽  
Takao Shimomura

This paper presents high-level functional Web components such as frames, framesets, and pivot tables, which conventional development environments for Web applications have not yet supported. Frameset Web components provide several editing facilities such as adding, deleting, changing, and nesting of framesets to make it easier to develop Web applications that use frame facilities. Pivot table Web components sum up various kinds of data in two dimensions. They reduce the amount of code to be written by developers greatly. The paper also describes the system that implements these high-level functional components as visual Web components. This system assists designers in the development of Web applications based on the page-transition framework that models a Web application as a set of Web page transitions, and by using visual Web components, makes it easier to write processes to be executed when a Web page transfers to another.


Sign in / Sign up

Export Citation Format

Share Document