Using response action with Intelligent Intrusion detection and prevention System against web application malware

Ammar Alazab, Michael Hobbs, Jemal Abawajy, Ansam Khraisat, Mamoun Alazab

Research output: Contribution to journalArticlepeer-review

21 Citations (Scopus)

Abstract

Purpose: The purpose of this paper is to mitigate vulnerabilities in web applications, security detection and prevention are the most important mechanisms for security. However, most existing research focuses on how to prevent an attack at the web application layer, with less work dedicated to setting up a response action if a possible attack happened.

Design/methodology/approach: A combination of a Signature-based Intrusion Detection System (SIDS) and an Anomaly-based Intrusion Detection System (AIDS), namely, the Intelligent Intrusion Detection and Prevention System (IIDPS).

Findings: After evaluating the new system, a better result was generated in line with detection efficiency and the false alarm rate. This demonstrates the value of direct response action in an intrusion detection system.

Research limitations/implications: Data limitation.

Originality/value: The contributions of this paper are to first address the problem of web application vulnerabilities. Second, to propose a combination of an SIDS and an AIDS, namely, the IIDPS. Third, this paper presents a novel approach by connecting the IIDPS with a response action using fuzzy logic. Fourth, use the risk assessment to determine an appropriate response action against each attack event. Combining the system provides a better performance for the Intrusion Detection System, and makes the detection and prevention more effective.

Original languageEnglish
Pages (from-to)431-449
Number of pages19
JournalInformation Management and Computer Security
Volume22
Issue number5
DOIs
Publication statusPublished - 2014
Externally publishedYes

Fingerprint

Dive into the research topics of 'Using response action with Intelligent Intrusion detection and prevention System against web application malware'. Together they form a unique fingerprint.

Cite this