메뉴 건너뛰기




Volumn 22, Issue 5, 2014, Pages 431-449

Using response action with Intelligent Intrusion detection and prevention System against web application malware

Author keywords

Information security; Risk management; Security

Indexed keywords

FUZZY LOGIC; MALWARE; RISK ASSESSMENT; RISK MANAGEMENT; SECURITY OF DATA;

EID: 84915760589     PISSN: 09685227     EISSN: None     Source Type: Journal    
DOI: 10.1108/IMCS-02-2013-0007     Document Type: Article
Times cited : (22)

References (32)
  • 9
    • 56549099594 scopus 로고    scopus 로고
    • WebIDS: A cooperative bayesian anomaly-based intrusion detection system for web applications (Extended Abstract)
    • Springer Berlin, Heidelberg
    • Dagorn, N. (2008), "WebIDS: a cooperative bayesian anomaly-based intrusion detection system for web applications (Extended Abstract) ", Recent Advances in Intrusion Detection, Springer Berlin, Heidelberg pp. 392-393.
    • (2008) Recent Advances in Intrusion Detection , pp. 392-393
    • Dagorn, N.1
  • 10
    • 80051793908 scopus 로고    scopus 로고
    • Data preprocessing for anomaly based network intrusion detection: A review
    • Davis, J. J. and Clark, A. J. (2011), "Data preprocessing for anomaly based network intrusion detection: a review", Computers & Security, Vol. 30 Nos 6/7, pp. 353-375.
    • (2011) Computers & Security , vol.30 , Issue.6-7 , pp. 353-375
    • Davis, J.J.1    Clark, A.J.2
  • 11
    • 79960556588 scopus 로고    scopus 로고
    • Alert correlation in collaborative intelligent intrusion detection systems - A survey
    • Elshoush, H. T. and Osman, I. M. (2011), "Alert correlation in collaborative intelligent intrusion detection systems - a survey", Applied Soft Computing, Vol. 11 No. 7, pp. 4349-4365.
    • (2011) Applied Soft Computing , vol.11 , Issue.7 , pp. 4349-4365
    • Elshoush, H.T.1    Osman, I.M.2
  • 12
    • 80455177941 scopus 로고    scopus 로고
    • Towards cyber defense: Research in intrusion detection and intrusion prevention systems
    • Faysel, M. A. and Haque, S. S. (2010), "Towards cyber defense: research in intrusion detection and intrusion prevention systems", International Journal of Computer Science and Network Security, Vol. 10 No. 7, pp. 316-325.
    • (2010) International Journal of Computer Science and Network Security , vol.10 , Issue.7 , pp. 316-325
    • Faysel, M.A.1    Haque, S.S.2
  • 15
    • 77956613687 scopus 로고    scopus 로고
    • A novel intrusion detection system based on hierarchical clustering and support vector machines
    • Horng, S. J., Su, M. Y., Chen, Y. H., Kao, T. W., Chen, R. J., Lai, J. L. and Perkasa, C. D. (2011), "A novel intrusion detection system based on hierarchical clustering and support vector machines", Expert Systems with Applications, Vol. 38 No. 1, pp. 306-313.
    • (2011) Expert Systems with Applications , vol.38 , Issue.1 , pp. 306-313
    • Horng, S.J.1    Su, M.Y.2    Chen, Y.H.3    Kao, T.W.4    Chen, R.J.5    Lai, J.L.6    Perkasa, C.D.7
  • 16
    • 84870698695 scopus 로고    scopus 로고
    • Database intrusion prevention cum detection system with appropriate response
    • Jaiswal, A. and Jain, S. (2010), "Database intrusion prevention cum detection system with appropriate response", International Journal of Information Technology, Vol. 2 No. 2, pp. 651-656.
    • (2010) International Journal of Information Technology , vol.2 , Issue.2 , pp. 651-656
    • Jaiswal, A.1    Jain, S.2
  • 18
    • 76649142367 scopus 로고    scopus 로고
    • Protecting a moving target: Addressing web application concept drift
    • Springer Berlin, Heidelberg
    • Maggi, F., Robertson, W., Kruegel, C. and Vigna, G. (2009), "Protecting a moving target: addressing web application concept drift", Recent Advances in Intrusion Detection, Springer Berlin, Heidelberg, pp. 21-40.
    • (2009) Recent Advances in Intrusion Detection , pp. 21-40
    • Maggi, F.1    Robertson, W.2    Kruegel, C.3    Vigna, G.4
  • 21
    • 85090433665 scopus 로고    scopus 로고
    • Snort-lightweight intrusion detection for networks
    • Seattle, Washington, 7-12 November
    • Roesch, M. (1999), "Snort-lightweight intrusion detection for networks", Proceedings of the 13th USENIX Conference on System Administration, Seattle, Washington, 7-12 November, pp. 229-238.
    • (1999) Proceedings of the 13th USENIX Conference on System Administration , pp. 229-238
    • Roesch, M.1
  • 22
    • 63049125148 scopus 로고    scopus 로고
    • An incremental frequent structure mining framework for real-time alert correlation
    • Sadoddin, R. and Ghorbani, A. A. (2009), "An incremental frequent structure mining framework for real-time alert correlation", Computers & Security, Vol. 28 Nos 3/4, pp. 153-173.
    • (2009) Computers & Security , vol.28 , Issue.3-4 , pp. 153-173
    • Sadoddin, R.1    Ghorbani, A.A.2
  • 25
    • 0038324607 scopus 로고    scopus 로고
    • SPADE, "Silicon defense", available at: www.silicondefense.com/software/spice
    • Silicon Defense
    • SPADE1
  • 29
    • 0002067431 scopus 로고    scopus 로고
    • NetSTAT: A network-based intrusion detection system
    • Vigna, G. and Kemmerer, R. A. (1999), "NetSTAT: a network-based intrusion detection system", Journal of Computer Security, Vol. 7 No. 1, pp. 37-72.
    • (1999) Journal of Computer Security , vol.7 , Issue.1 , pp. 37-72
    • Vigna, G.1    Kemmerer, R.A.2
  • 30
    • 68149139611 scopus 로고    scopus 로고
    • Reducing errors in the anomaly-based detection of web-based attacks through the combined analysis of web requests and SQL queries
    • Vigna, G., Valeur, F., Balzarotti, D., Robertson, W., Kruegel, C. and Kirda, E. (2009), "Reducing errors in the anomaly-based detection of web-based attacks through the combined analysis of web requests and SQL queries", Journal of Computer Security, Vol. 17 No. 3, pp. 305-329.
    • (2009) Journal of Computer Security , vol.17 , Issue.3 , pp. 305-329
    • Vigna, G.1    Valeur, F.2    Balzarotti, D.3    Robertson, W.4    Kruegel, C.5    Kirda, E.6
  • 31
    • 79551626282 scopus 로고    scopus 로고
    • Linguistic summarization using IF-THEN rules and interval type-2 fuzzy sets
    • Wu, D. and Mendel, J. M. (2011), "Linguistic summarization using IF-THEN rules and interval type-2 fuzzy sets", IEEE Transactions on Fuzzy Systems, Vol. 19 No. 1, pp. 136-151.
    • (2011) IEEE Transactions on Fuzzy Systems , vol.19 , Issue.1 , pp. 136-151
    • Wu, D.1    Mendel, J.M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.