Developing an Intelligent Intrusion Detection and Prevention System against Web Application Malware

被引:0
|
作者
Alazab, Ammar [1 ]
Hobbs, Michael [1 ]
Abawajy, Jemal [1 ]
Khraisat, Ansam [2 ]
机构
[1] Deakin Univ, Sch Informat Technol, Waurn Ponds, Australia
[2] Univ Ballarat, Ballarat, Vic, Australia
来源
ADVANCES IN SECURITY OF INFORMATION AND COMMUNICATION NETWORKS | 2013年 / 381卷
关键词
Intrusion Detection System; Response Action; Malware; Signature Base Detection; Anomaly Base Detection; Web application;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malware authors are continuously developing crime toolkits. This has led to the situation of zero-day attacks, where malware harm computer systems despite the protection from existing Intrusion Detection Systems (IDSs). We propose an Intelligent Intrusion Detection and Prevention System (IIDPS) approach that combines the Signature based Intrusion Detection system (SIDS), Anomaly based Intrusion Detection System (AIDS) and Response Intrusion Detection System (RIDS). We used a risk assessment approach to determine an appropriate response action against each attack event. We also demonstrated the IIDPS make the detection and prevention of malware more effective.
引用
收藏
页码:177 / +
页数:3
相关论文
共 50 条
  • [21] Detection and Prevention of Malware in Android Operating System
    Dahri, Kashif Ali
    Vighio, Muhammad Saleem
    Zardari, Bagar Ali
    MEHRAN UNIVERSITY RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY, 2021, 40 (04) : 847 - 859
  • [22] A Network Function Virtualization Architecture for Automatic and Efficient Detection and Mitigation against Web Application Malware
    Mauricio, Leopoldo
    Rubinstein, Marcelo
    JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2023, 13 (01)
  • [23] An Intelligent Intrusion Prevention System for Cloud Computing (SIPSCC)
    Alqahtani, Saeed M.
    Al Balushi, Maqbool
    John, Robert
    2014 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), VOL 2, 2014, : 152 - 158
  • [24] Intelligent query in intrusion detection audit system
    Gao, F
    Xue, Q
    Sun, JZ
    2003 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-5, PROCEEDINGS, 2003, : 2212 - 2216
  • [25] An intelligent lightweight intrusion detection system(IDS)
    Hu Zheng Bing
    Shirochin, V. P.
    Su Jun
    TENCON 2005 - 2005 IEEE REGION 10 CONFERENCE, VOLS 1-5, 2006, : 2202 - 2208
  • [26] Intelligent Agents for Distributed Intrusion Detection System
    Benattou, M.
    Tamine, K.
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 6, 2005, : 190 - 193
  • [27] An intelligent lightweight intrusion detection system(IDS)
    Hu, ZB
    Shirochin, VP
    Yang, YP
    Eurocon 2005: The International Conference on Computer as a Tool, Vol 1 and 2 , Proceedings, 2005, : 652 - 655
  • [28] An Extended Intrusion Detection and Prevention System for Next Generation Network Application Plane
    Khan, Zeeshan Shafi
    Rashid, Khalid
    Khan, Muhammad Khurram
    Sher, Muhammad
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2011, 14 (01): : 135 - 149
  • [29] SensorWebIDS: a web mining intrusion detection system
    Ezeife, C. I.
    Dong, Jingyu
    Aggarwal, A. K.
    INTERNATIONAL JOURNAL OF WEB INFORMATION SYSTEMS, 2008, 4 (01) : 97 - +
  • [30] APPLICATION OF BPNN IN CLASSIFICATION OF TIME INTERVALS FOR INTELLIGENT INTRUSION DETECTION DECISION RESPONSE SYSTEM
    Zhu, Hongbing
    Kai, Hongmei
    Eguchi, Kei
    Guo, Zhanyong
    Wang, Jun
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2008, 4 (10): : 2483 - 2491