A P2P and Rule-based Web Application Intrusion Prevention System

被引:0
|
作者
Wang Fang [1 ]
He Qian [1 ]
Wang Yong [1 ]
Yao Linlin [1 ]
机构
[1] Guilin Univ Elect Technol, Guangxi Key Lab Wireless Wideband Commun & Signal, Guilin, Peoples R China
关键词
Web application; Intrusion Prevention System; P2P; Rule based;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Such traditional security tools as Firewalls, IDS and IPS are limited to their own product positioning and the depth of protection, which cannot resist attacks against web platform effectively, so a P2P and rule based Web application intrusion prevention system is designed in this paper. The system achieves to client requests and responses through a reverse proxy, and each node runs the same application program to accomplish peer-to-peer structure using P2P architecture. The primary and secondary nodes are determined dynamically based on users' demand. The primary node can remain sessions and balance the loads. The secondary node is used to detect intrusions using rule based expert libraries and plug-ins. The experimental results show that the system can prevent application layer attacks effectively, and response more quickly and more stable than single node.
引用
收藏
页码:410 / 414
页数:5
相关论文
共 50 条
  • [1] Study on Rule-based Data Protection System Using Blockchain in P2P Distributed Networks
    Kim, Kyong Jin
    Hong, Seng Phil
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (11): : 201 - 210
  • [2] P2P based intrusion detection
    Czirkos, Zoltan
    Hosszu, Gabor
    INFOCOMMUNICATIONS JOURNAL, 2009, 1 (01): : 3 - 10
  • [3] Automated Simulation P2P Botnets Signature Detection by Rule-based Approach
    Abdullah, Raihana Syahirah
    Faizal, M. A.
    Noh, Zul Azri Muhamad
    Ahmad, Nurulhuda
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (08) : 131 - 135
  • [4] A collaborated computing system by web services based P2P architecture
    Tsai, Min-Jen
    Wang, Chen-Sheng
    Yang, Po-Yu
    Yang, Chien-Yu
    COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN II, 2006, 3865 : 194 - 204
  • [5] The system design of a node of P2P networks for intrusion detection
    Ding, Lei
    Yu, Fei
    Yang, Zhenghua
    Yue, Guangxue
    Journal of Networks, 2013, 8 (08) : 1920 - 1927
  • [7] Disaster recovery backup system for P2P based VoIP application
    Shuang, K. (shuangk@bupt.edu.cn), 1600, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09):
  • [8] A P2P Network Based Architecture for Web Service
    Wang, Zhenqi
    Hu, Yuanyuan
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 3446 - 3449
  • [9] ID Based Web Browser with P2P Property
    Jeon, Hae Sook
    Jung, Heeyoung
    Chun, Woojik
    2015 9TH INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION AND NETWORKING (FGCN), 2015, : 41 - 44
  • [10] Web Services Discovery with QoS Based on P2P
    Li, Jin
    Song, Bo
    SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING: THEORY AND PRACTICE, VOL 1, 2012, 114 : 707 - 712