A P2P and Rule-based Web Application Intrusion Prevention System

被引:0
|
作者
Wang Fang [1 ]
He Qian [1 ]
Wang Yong [1 ]
Yao Linlin [1 ]
机构
[1] Guilin Univ Elect Technol, Guangxi Key Lab Wireless Wideband Commun & Signal, Guilin, Peoples R China
来源
2013 8TH INTERNATIONAL ICST CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM) | 2013年
关键词
Web application; Intrusion Prevention System; P2P; Rule based;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Such traditional security tools as Firewalls, IDS and IPS are limited to their own product positioning and the depth of protection, which cannot resist attacks against web platform effectively, so a P2P and rule based Web application intrusion prevention system is designed in this paper. The system achieves to client requests and responses through a reverse proxy, and each node runs the same application program to accomplish peer-to-peer structure using P2P architecture. The primary and secondary nodes are determined dynamically based on users' demand. The primary node can remain sessions and balance the loads. The secondary node is used to detect intrusions using rule based expert libraries and plug-ins. The experimental results show that the system can prevent application layer attacks effectively, and response more quickly and more stable than single node.
引用
收藏
页码:410 / 414
页数:5
相关论文
共 50 条
  • [21] SEWSIP: Semantic based Web services integration in P2P
    Li, JZ
    Xu, B
    Yang, WJ
    Chen, DW
    Zhang, P
    Wang, KH
    SOSE 2005: IEEE INTERNATIONAL WORKSHOP ON SERVICE-ORIENTED SYSTEM ENGINEERING, 2005, : 97 - 101
  • [22] Web Services discovery in P2P networks based on Clustering
    Benghida, Amira
    Boufaida, Mahmoud
    2014 1ST INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES FOR DISASTER MANAGEMENT (ICT-DM), 2014, : 88 - 94
  • [23] The method of P2P traffic detecting for P2P harmful contents prevention
    Lee, HG
    Nam, TY
    Jang, JS
    7th International Conference on Advanced Communication Technology, Vols 1 and 2, Proceedings, 2005, : 777 - 780
  • [24] A P2P BASED ARCHITECTURE FOR SEMANTIC WEB SERVICE DISCOVERY
    Di Modica, Giuseppe
    Tomarchio, Orazio
    Vita, Lorenzo
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2011, 21 (07) : 1013 - 1035
  • [25] Blockchain based Security Framework for P2P Filesharing system Blockchain based Security Framework for P2P Filesharing system
    Pradhan, Srikanta
    Tripathy, Somanath
    Nandi, Sukumar
    2018 IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATIONS SYSTEMS (ANTS), 2018,
  • [26] P2P worm detection based on application identification
    Xia C.
    Shi Y.
    Li X.
    Gao W.
    Front. Comput. Sci. China, 2007, 1 (114-122): : 114 - 122
  • [27] Administration of P2P Systems Based on Application Contexts
    Komkhao, Maytiyanin
    Sodsee, Sunantha
    Poolketgij, Nanthachai
    Unger, Herwig
    AUTONOMOUS SYSTEMS: DEVELOPMENTS AND TRENDS, 2011, 391 : 363 - +
  • [28] Towards collaborative security and P2P intrusion detection
    Locasto, ME
    Parekh, JJ
    Keromytis, AD
    Stolfo, SJ
    Proceedings from the Sixth Annual IEEE Systems, Man and Cybernetics Information Assurance Workshop, 2005, : 333 - 339
  • [29] Cooperative Cache Distribution System for Virtual P2P Web Proxy
    Matsushita, Kazuki
    Nishimine, Masashi
    Ueda, Kazunori
    IEEE 39TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC 2015), VOL 3, 2015, : 646 - 647
  • [30] Pat: A P2P based Publish/Subscribe System for QoS Information Dissemination of Web Services
    Zheng, Xiao
    Luo, Junzhou
    Cao, Jiuxin
    2009 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, VOLS 1 AND 2, 2009, : 839 - 846