Deepak Singh Tomar

Work place: CSE Department, MANIT, Bhopal, 462003, India

E-mail: deepaktomar@manit.ac.in

Website:

Research Interests: Computer systems and computational processes, Computer Architecture and Organization, Data Mining, Data Structures and Algorithms

Biography

Dr. Deepak Singh Tomar obtained his B. E., M. Tech. and Ph. D. degrees in CSE department. He is currently Assistant Professor of CSE department at NIT-Bhopal, India. He is co-investigator of Information Security Education Awareness (ISEA) project under Govt. of India. He has more than 19 years of teaching experience. He has guided 24 M Tech and 2 PhD Thesis.  Besides this he guided 70 B Tech and 15 MCA projects. He has published more than 44 papers in national & international journals and conferences. He is holding positions in many world renowned professional bodies. His present research interests include web mining and cyber security.

Author Articles
DNS Pharming through PHP Injection: Attack Scenario and Investigation

By Divya Rishi Sahu Deepak Singh Tomar

DOI: https://doi.org/10.5815/ijcnis.2015.04.03, Pub. Date: 8 Mar. 2015

With the increase in technology, Internet has provided set of tools and technologies which has enabled web programmers to develop effective websites. PHP is most widely used server side scripting language and more than twenty million of web sites are designed through PHP. It has used as a core script in Web Content Management System (WCMS), such as Joomla, WordPress, Drupal, SilverStripe etc. PHP has also security flaws due to the certain vulnerabilities such as PHP injection, remote file inclusion and unauthorized file creation. PHP injection is a variant of code injection attacks in which PHP script may be exploited to execute remote commands. The contribution of this paper is twofold: First, it presents a unifying view of PHP injection vulnerability, which causes alteration in the ‘hosts file’; Second, It introduces an investigation process against alteration in ‘hosts file’ through PHP injection. This attack has been introduced as a type of DNS pharming. In this investigation process a chain of evidence has been created and an algebraic signature has been developed to detect explained attack.

[...] Read more.
Other Articles