A New Approach to Detect WEB Attacks Senario in Intrusion Detection System

被引:0
|
作者
Rahmoun, Noureddine [1 ]
Saber, Mohammed [1 ]
Ettifouri, Elhassane [1 ]
Zeaaraoui, Adil [1 ]
Bouchentouf, Toumi [1 ]
机构
[1] First Mohammed Univ, Natl Sch Appl Sci, Lab LSE2I, Oujda, Morocco
关键词
WEB attacks; Intrusion detection system (IDS); Naive bayes classifier; Markov chain; False positive;
D O I
10.1007/978-3-319-30298-0_59
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The tremendous growth of the web-based applications has increased information security vulnerabilities over the Internet. Security administrators use Intrusion-Detection System (IDS) to monitor network traffic and host activities to detect attacks against hosts and network resources. The solutions proposed in the literature actually achieved good results for the detection rate, while there is still room for reducing the false positive rate. To this end, in this paper we propose a model of an IDS based on combination of Markov chain and Naive Bayes, to reduce the rate of false positive.
引用
收藏
页码:569 / 573
页数:5
相关论文
共 50 条
  • [21] Intrusion detection system to detect variant attacks using learning algorithms with automatic generation of training data
    Yamada, A
    Miyake, Y
    Takemori, K
    Tanaka, T
    ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 1, 2005, : 650 - 655
  • [22] Intrusion Detection System for the Detection of Blackhole Attacks in a Smart Grid
    Boumkheld, Nadia
    Ghogho, Mounir
    El Koutbi, Mohammed
    2016 4TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL AND BUSINESS INTELLIGENCE (ISCBI), 2016, : 108 - 111
  • [23] A Hybrid Intrusion Detection Model for Web Log-Based Attacks
    Zou, Junwei
    Tao, Dan
    Yu, Jing
    JOURNAL OF INTERNET TECHNOLOGY, 2017, 18 (04): : 887 - 895
  • [24] INTRUSION DETECTION METHOD FOR DENIAL OF SERVICE ATTACKS ON THE WEB-APPLICATIONS
    Sorokin, S. N.
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2014, 23 (01): : 55 - +
  • [25] Internet attacks and intrusion detection system A review of the literature
    Singh, Raman
    Kumar, Harish
    Singla, Ravinder Kumar
    Ketti, Ramachandran Ramkumar
    ONLINE INFORMATION REVIEW, 2017, 41 (02) : 171 - 184
  • [26] Using Attacks Ontology in Distributed Intrusion Detection System
    Abdoli, F.
    Kahani, M.
    ADVANCES IN COMPUTER AND INFORMATIOM SCIENCES AND ENGINEERING, 2008, : 153 - +
  • [27] An Active Intrusion Detection System for LAN Specific Attacks
    Hubballi, Neminath
    Roopa, S.
    Ratti, Ritesh
    Barbhuiya, F. A.
    Biswas, Santosh
    Sur, Arijit
    Nandi, Sukumar
    Ramachandran, Vivek
    ADVANCES IN COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2010, 6059 : 129 - 142
  • [28] A Fuzzy Intrusion Detection System Based on Categorization of Attacks
    Varshovi, Ali
    Rostamipour, Maryam
    Sadeghiyan, Babak
    2014 6TH CONFERENCE ON INFORMATION AND KNOWLEDGE TECHNOLOGY (IKT), 2014, : 50 - 55
  • [29] Response option for attacks detected by Intrusion Detection System
    Anwar, Shahid
    Zain, Jasni Muhamad
    Zolkipli, Mohamad Fadli
    Inayat, Zakira
    Jabir, Aws Naser
    Odili, Julius Beneoluchi
    2015 4TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND COMPUTER SYSTEMS (ICSECS), 2015, : 195 - 200
  • [30] An Enhanced Intrusion Detection System for Routing Attacks in MANET
    Abirami, K. Rama
    Sumithra, M. G.
    Rajasekaran, J.
    PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS (ICACCS), 2013,