A P2P and Rule-based Web Application Intrusion Prevention System

被引:0
|
作者
Wang Fang [1 ]
He Qian [1 ]
Wang Yong [1 ]
Yao Linlin [1 ]
机构
[1] Guilin Univ Elect Technol, Guangxi Key Lab Wireless Wideband Commun & Signal, Guilin, Peoples R China
来源
2013 8TH INTERNATIONAL ICST CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM) | 2013年
关键词
Web application; Intrusion Prevention System; P2P; Rule based;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Such traditional security tools as Firewalls, IDS and IPS are limited to their own product positioning and the depth of protection, which cannot resist attacks against web platform effectively, so a P2P and rule based Web application intrusion prevention system is designed in this paper. The system achieves to client requests and responses through a reverse proxy, and each node runs the same application program to accomplish peer-to-peer structure using P2P architecture. The primary and secondary nodes are determined dynamically based on users' demand. The primary node can remain sessions and balance the loads. The secondary node is used to detect intrusions using rule based expert libraries and plug-ins. The experimental results show that the system can prevent application layer attacks effectively, and response more quickly and more stable than single node.
引用
收藏
页码:410 / 414
页数:5
相关论文
共 50 条
  • [31] Agent-community-based P2P semantic web information retrieval system architecture
    Yu, HB
    Mine, T
    Amamiya, M
    EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005, 2005, 3824 : 538 - 549
  • [32] A rule-based approach to Web-based application development
    Tammet, Tanel
    Haav, Hele-Mai
    Kadarpik, Vello
    Kaaramees, Marko
    2006 SEVENTH INTERNATIONAL BALTIC CONFERENCE ON DATABASES AND INFORMATION SYSTEMS - PROCEEDINGS, 2006, : 202 - +
  • [33] A SPIT prevention system by black/white list for P2P SIP
    Koo, Tung-Ming
    Huang, Shih-Ying
    Shen, Chih-Chang
    Chen, Xiao-Qi
    Beijing Jiaotong Daxue Xuebao/Journal of Beijing Jiaotong University, 2008, 32 (05): : 1 - 7
  • [34] A Rule-based Intrusion Detection System for NDN-based VANETs
    Veettili, Sruthi Cheriyachan
    Rehman, Muhammad Atif Ur
    Khalid, Waqas
    Al-Khalidi, Mohammed
    Kim, Byung Seo
    2024 IEEE 21ST INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SMART SYSTEMS, MASS 2024, 2024, : 604 - 609
  • [35] Study on Application Layer Multicast Technology Based on P2P Streaming Media System
    Wang, Wei
    Zhang, Hong-yan
    2009 INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2009), VOLUMES 1 AND 2, 2009, : 1088 - 1091
  • [36] A self-organizing P2P system for VoIP application
    Bin, Dai
    Furong, Wang
    Jian, Liu
    2006 INTERNATIONAL CONFERENCE ON INFORMATION AND TECHNOLOGY: RESEARCH AND EDUCATION, 2006, : 196 - +
  • [37] Ontology-Based Knowledge Representation for a P2P Multi-Agent Distributed Intrusion Detection System
    Ye, Dayong
    Bai, Quan
    Zhano, Minjie
    2008 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING, PROCEEDINGS, 2008, : 111 - 118
  • [38] A Structure P2P Based Web Services Registry with Access and Control
    He Qian
    Zhao Baokang
    Long Yunjian
    Su Jinshu
    You, Ilsun
    AVAILABILITY, RELIABILITY, AND SECURITY IN INFORMATION SYSTEMS, 2014, 8708 : 286 - +
  • [39] A CAN-based P2P infrastructure for Semantic Web Services
    Channa, Nizamuddin
    Li, Shanping
    Shi, Wei
    Peng, Gang
    Proceedings of the ASME International Design Engineering Technical Conferences and Computers and Information in Engineering Conference 2005, Vol 3, Pts A and B, 2005, : 1025 - 1029
  • [40] Worm detection system based on P2P networks
    Tang, Haokun
    Liu, Yanbing
    Huang, Jun
    Xiao, Yunpeng
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2012, 40 (SUPPL.1): : 230 - 235