Research on intrusion detection based on Boyer-Moore pattern matching algorithm

被引:0
作者
Li, Yulong [1 ,2 ]
Li, Chenhao [1 ]
Jiao, Yang [3 ]
Zhao, Guogang [2 ]
Liu, Yang [4 ]
Zhang, Tian [4 ]
机构
[1] Changchun Univ, Cybersecur Acad, Changchun 130022, Jilin, Peoples R China
[2] Jilin Prov Transport Sci Res Instiina, Changchun 130012, Jilin, Peoples R China
[3] Changchun Sixth Middle Sch, Changchun 130031, Jilin, Peoples R China
[4] Chongqing Publ Secur Bur, Chongqing 401336, Peoples R China
来源
PROCEEDINGS OF 2023 7TH INTERNATIONAL CONFERENCE ON ELECTRONIC INFORMATION TECHNOLOGY AND COMPUTER ENGINEERING, EITCE 2023 | 2023年
关键词
WEB log; Intrusion detection; Pattern matching; Boyer-Moore;
D O I
10.1145/3650400.3650650
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security of WEB applications has always been an important research direction in the field of network security. Intrusion detection based on WEB logs is a common detection method. It analyzes the access logs of the WEB server to detect malicious requests and attack behaviors, thereby protecting the security of WEB applications. In this article, we will discuss an intrusion detection method based on the Boyer-Moore algorithm to prevent SQL injection and XSS attacks. This method is based on the pattern matching algorithm Boyer-Moore. It uses misuse detection technology to compare log information with known feature values to determine whether an attack has occurred, and displays the detection results to the user through a visual interface to help users Better understand the current security landscape. The experiment verified the effectiveness and feasibility of the intrusion detection system based on Boyer-Moore pattern matching algorithm, which can provide strong security guarantee for WEB applications.
引用
收藏
页码:1490 / 1494
页数:5
相关论文
共 11 条
[1]  
Charu G, 2022, Computational Intelligence and Neuroscience
[2]  
Chaudhary P, 2018, Int. J. of Web Based Communities, V14
[3]   Application of Improved BM Algorithm in String Approximate Matching [J].
Duan, Ying ;
Long, Hua ;
Qu, Yu Quan .
PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MECHATRONICS AND INTELLIGENT ROBOTICS (ICMIR-2019), 2020, 166 :576-581
[4]  
Mariam I, 2023, Journal of Engineering Research, V11
[5]  
Masdari M, 2020, Applied Soft Computing Journal, V2020, P92
[6]  
Mohammed N, 2023, Information Security Journal: A Global Perspective, V32
[7]  
Obeidat I., 2019, International Journal of Computing, V18, P278, DOI DOI 10.47839/IJC.18.3.1520
[8]  
Ponmaniraj S, 2020, Journal of Critical Reviews, V7
[9]  
Rahmat F R, 2018, IOP Conference Series: Materials Science and Engineering 2018, V14
[10]  
Rong C., 2022, Computational Intelligence and Neuroscience