I. J. Computer Network and Information Security, 2015, 3, 10-17 Published Online February 2015 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2015.03.02 Forensics Investigation of Web Application Security Attacks Amor Lazzez, Thabet Slimani College of Computers and Information Technologies, Taif University, Kingdom of Saudi Arabia Email:
[email protected],
[email protected] Abstract—Nowadays, web applications are popular applications constitute a motivating environment for targets for security attackers. Using specific security attackers to perform security attacks. This involves the mechanisms, we can prevent or detect a security attack on development of various methods to perform a security a web application, but we cannot find out the criminal attack on a web application. The famous are: Cross-Site who has carried out the security attack. Being unable to Scripting, SQL injection, Code Injection, and Buffer trace back an attack, encourages hackers to launch new Overflow [1]. As long as web applications constitute the attacks on the same system. Web application forensics most important mean of data communication over the aims to trace back and attribute a web application security Internet, different techniques have been developed to attack to its originator. This may significantly reduce the protect web applications against hackers. Firewalls and security attacks targeting a web application every day, systems’ security patching are used for attack prevention; and hence improve its security. The aim of this paper is to intrusion detection systems and antivirus are used for carry out a detailed overview about the web application attack detection [1, 4]. forensics.