2014
DOI: 10.1108/imcs-02-2013-0007
|View full text |Cite
|
Sign up to set email alerts
|

Using response action with intelligent intrusion detection and prevention system against web application malware

Abstract: Purpose – The purpose of this paper is to mitigate vulnerabilities in web applications, security detection and prevention are the most important mechanisms for security. However, most existing research focuses on how to prevent an attack at the web application layer, with less work dedicated to setting up a response action if a possible attack happened. Design/methodology/approach – A combination of a Signature-based Intrusion Detection … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0
1

Year Published

2015
2015
2023
2023

Publication Types

Select...
7
3

Relationship

2
8

Authors

Journals

citations
Cited by 31 publications
(20 citation statements)
references
References 18 publications
0
18
0
1
Order By: Relevance
“…For example, attackers' behaviors are different in different network topologies, operating systems, and software and crime toolkits. Nevertheless, KDD99 remains in use as a benchmark within IDS research community and is still presently being used by researchers (Alazab et al, 2014;Duque & Omar, 2015;Ji et al, 2016).…”
Section: Darpa / Kdd Cup99mentioning
confidence: 99%
“…For example, attackers' behaviors are different in different network topologies, operating systems, and software and crime toolkits. Nevertheless, KDD99 remains in use as a benchmark within IDS research community and is still presently being used by researchers (Alazab et al, 2014;Duque & Omar, 2015;Ji et al, 2016).…”
Section: Darpa / Kdd Cup99mentioning
confidence: 99%
“…Current works on IDS for IoT have three primary classes: Anomaly-based Intrusion Detection System (AIDS), Signature-based Intrusion Detection Systems (SIDS), and hybrid. In short, SIDS relies on pattern matching techniques for finding known attacks; these are also known as Knowledge-based Detection or Misuse Detection [24]. In SIDS, matching methods are used to find a previous intrusion.…”
Section: Related Workmentioning
confidence: 99%
“…Secondly, the higher the number of signatures in the database, the longer it takes to analyses and process the huge volume of data. Thirdly and most importantly, SIDS has difficulty in detecting zero-day malware as the signature is not stored in the database [6].…”
Section: Introductionmentioning
confidence: 99%