Title | A Signature-Based Intrusion Detection System for Web Applications Based on Genetic Algorithm |
Publication Type | Conference Paper |
Year of Publication | 2016 |
Authors | Bronte, Robert, Shahriar, Hossain, Haddad, Hisham M. |
Conference Name | Proceedings of the 9th International Conference on Security of Information and Networks |
Date Published | July 2016 |
Publisher | ACM |
Conference Location | New York, NY, USA |
ISBN Number | 978-1-4503-4764-8 |
Keywords | application layer attacks signatures, composability, Cross Layer Security, cross over, genetic algorithm, intrusion detection system, log analysis, mutation, pubcrawl, Resiliency, selection |
Abstract | Web application attacks are an extreme threat to the world's information technology infrastructure. A web application is generally defined as a client-server software application where the client uses a user interface within a web browser. Most users are familiar with web application attacks. For instance, a user may have received a link in an email that led the user to a malicious website. The most widely accepted solution to this threat is to deploy an Intrusion Detection System (IDS). Such a system currently relies on signatures of the predefined set of events matching with attacks. Issues still arise as all possible attack signatures may not be defined before deploying an IDS. Attack events may not fit with the pre-defined signatures. Thus, there is a need to detect new types of attacks with a mutated signature based detection approach. Most traditional literature works describe signature based IDSs for application layer attacks, but several works mention that not all attacks can be detected. It is well known that many security threats can be related to software or application development and design or implementation flaws. Given that fact, this work expands a new method for signature based web application layer attack detection. We apply a genetic algorithm to analyze web server and database logs and the log entries. The work contributes to the development of a mutated signature detection framework. The initial results show that the suggested approach can detect specific application layer attacks such as Cross-Site Scripting, SQL Injection and Remote File Inclusion attacks. |
URL | https://dl.acm.org/doi/10.1145/2947626.2951964 |
DOI | 10.1145/2947626.2951964 |
Citation Key | bronte_signature-based_2016 |