A Closer Look at Intrusion Detection System for Web Applications

被引:17
作者
Agarwal, Nancy [1 ]
Hussain, Syed Zeeshan [1 ]
机构
[1] Jamia Millia Islamia, Dept Comp Sci, New Delhi, India
关键词
ANOMALY-BASED DETECTION; ATTACKS;
D O I
10.1155/2018/9601357
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion Detection System (IDS) acts as a defensive tool to detect the security attacks on the web. IDS is a known methodology for detecting network-based attacks but is still immature in monitoring and identifying web-based application attacks. The objective of this research paper is to present a design methodology for efficient IDS with respect to web applications. In this paper, we present several specific aspects which make it challenging for an IDS to monitor and detect web attacks. The article also provides a comprehensive overview of the existing detection systems exclusively designed to observe web traffic. Furthermore, we identify various dimensions for comparing the IDS from different perspectives based on their design and functionalities. We also propose a conceptual framework of a web IDS with a prevention mechanism to offer systematic guidance for the implementation of the system. We compare its features with five existing detection systems, namely, AppSensor, PHPIDS, ModSecurity, Shadow Daemon, and AQTRONIX Web Knight. This paper will highly facilitate the interest groups with the cutting-edge information to understand the stronger and weaker sections of the domain and provide a firm foundation for developing an intelligent and efficient system.
引用
收藏
页数:27
相关论文
共 86 条
[1]   An Attacks Ontology for computer and networks attack [J].
Abdoli, F. ;
Meibody, N. ;
Bazoubandi, R. .
INNOVATIONS AND ADVANCES IN COMPUTER SCIENCES AND ENGINEERING, 2010, :473-476
[2]   Ontology-based Distributed Intrusion Detection System [J].
Abdoli, F. ;
Kahani, M. .
2009 14TH INTERNATIONAL COMPUTER CONFERENCE, 2009, :65-+
[3]  
Aghaei S., 2012, INT J WEB SEMANTIC T, V3, P1, DOI DOI 10.5121/IJWEST.2012.3101
[4]  
Al-Mamory SO, 2007, ELE COM ENG, P69
[5]   Using response action with Intelligent Intrusion detection and prevention System against web application malware [J].
Alazab, Ammar ;
Hobbs, Michael ;
Abawajy, Jemal ;
Khraisat, Ansam ;
Alazab, Mamoun .
Information Management and Computer Security, 2014, 22 (05) :431-449
[6]  
Almgren Magnus, 2000, NDSS
[7]  
[Anonymous], 2007, INT J INFORM COMPUTE, DOI DOI 10.1504/IJICS.2007.012248
[8]  
[Anonymous], 1999, RFC2616: Hypertext Transfer Protocol
[9]  
[Anonymous], INT J INFORM SECURIT
[10]  
[Anonymous], 2009, 2009 2 INT C COMP CO