Developing an Intelligent Intrusion Detection and Prevention System against Web Application Malware

被引:0
|
作者
Alazab, Ammar [1 ]
Hobbs, Michael [1 ]
Abawajy, Jemal [1 ]
Khraisat, Ansam [2 ]
机构
[1] Deakin Univ, Sch Informat Technol, Waurn Ponds, Australia
[2] Univ Ballarat, Ballarat, Vic, Australia
来源
ADVANCES IN SECURITY OF INFORMATION AND COMMUNICATION NETWORKS | 2013年 / 381卷
关键词
Intrusion Detection System; Response Action; Malware; Signature Base Detection; Anomaly Base Detection; Web application;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malware authors are continuously developing crime toolkits. This has led to the situation of zero-day attacks, where malware harm computer systems despite the protection from existing Intrusion Detection Systems (IDSs). We propose an Intelligent Intrusion Detection and Prevention System (IIDPS) approach that combines the Signature based Intrusion Detection system (SIDS), Anomaly based Intrusion Detection System (AIDS) and Response Intrusion Detection System (RIDS). We used a risk assessment approach to determine an appropriate response action against each attack event. We also demonstrated the IIDPS make the detection and prevention of malware more effective.
引用
收藏
页码:177 / +
页数:3
相关论文
共 50 条
  • [31] Detection and Prevention System against Cyber Attacks and Botnet Malware for Information Systems and Internet of Things
    Indre, Ionut
    Lemnaru, Camelia
    2016 IEEE 12TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTER COMMUNICATION AND PROCESSING (ICCP), 2016, : 175 - 182
  • [32] Difference between Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)
    Ashoor, Asmaa Shaker
    Gore, Sharad
    ADVANCES IN NETWORK SECURITY AND APPLICATIONS, 2011, 196 : 497 - +
  • [33] Application of CLIPS Expert System to Malware Detection System
    Zhou Ruili
    Pan Jianfeng
    Tan Xiaobin
    Xi Hongsheng
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 309 - 314
  • [34] Intrusion Detection and Prevention System: Challenges & Opportunities
    Bashir, Uzair
    Chachoo, Manzoor
    2014 INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2014, : 806 - 809
  • [35] A P2P and Rule-based Web Application Intrusion Prevention System
    Wang Fang
    He Qian
    Wang Yong
    Yao Linlin
    2013 8TH INTERNATIONAL ICST CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM), 2013, : 410 - 414
  • [36] Intrusion detection and prevention system for an IoT environment
    Kumar, Ajay
    Abhishek, K.
    Ghalib, M. R.
    Shankar, A.
    Cheng, X.
    DIGITAL COMMUNICATIONS AND NETWORKS, 2022, 8 (04) : 540 - 551
  • [37] IMMIX-Intrusion Detection and Prevention System
    Vasudeo, Sarode Harshal
    Patil, Pravin
    Kumar, R. Vinoth
    2015 INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES AND MANAGEMENT FOR COMPUTING, COMMUNICATION, CONTROLS, ENERGY AND MATERIALS (ICSTM), 2015, : 96 - 101
  • [38] Intrusion detection and prevention system for an IoT environment
    Ajay Kumar
    KAbhishek
    MRGhalib
    AShankar
    XCheng
    Digital Communications and Networks, 2022, 8 (04) : 540 - 551
  • [39] Real Time Intrusion Detection and Prevention System
    Kenkre, Poonam Sinai
    Pai, Anusha
    Colaco, Louella
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2014, VOL 1, 2015, 327 : 405 - 411
  • [40] Preventing Unknown Malware Attack by using Intelligence intrusion Multi detection prevention Systems
    Kuppusamy, K.
    Murugan, S.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (12): : 299 - 307