Using response action with Intelligent Intrusion detection and prevention System against web application malware

Ammar Alazab, Michael Hobbs, Jemal Abawajy, Ansam Khraisat, Mamoun Alazab*

*Corresponding author for this work

    Research output: Contribution to journalArticlepeer-review

    21 Citations (Scopus)

    Abstract

    Findings: After evaluating the new system, a better result was generated in line with detection efficiency and the false alarm rate. This demonstrates the value of direct response action in an intrusion detection system.

    Purpose: The purpose of this paper is to mitigate vulnerabilities in web applications, security detection and prevention are the most important mechanisms for security. However, most existing research focuses on how to prevent an attack at the web application layer, with less work dedicated to setting up a response action if a possible attack happened.

    Design/methodology/approach: A combination of a Signature-based Intrusion Detection System (SIDS) and an Anomaly-based Intrusion Detection System (AIDS), namely, the Intelligent Intrusion Detection and Prevention System (IIDPS).

    Research limitations/implications: Data limitation.

    Originality/value: The contributions of this paper are to first address the problem of web application vulnerabilities. Second, to propose a combination of an SIDS and an AIDS, namely, the IIDPS. Third, this paper presents a novel approach by connecting the IIDPS with a response action using fuzzy logic. Fourth, use the risk assessment to determine an appropriate response action against each attack event. Combining the system provides a better performance for the Intrusion Detection System, and makes the detection and prevention more effective.

    Original languageEnglish
    Pages (from-to)431-449
    Number of pages19
    JournalInformation Management and Computer Security
    Volume22
    Issue number5
    DOIs
    Publication statusPublished - 4 Nov 2014

    Fingerprint

    Dive into the research topics of 'Using response action with Intelligent Intrusion detection and prevention System against web application malware'. Together they form a unique fingerprint.

    Cite this