CFP last date
20 May 2024
Reseach Article

Enhanced Architecture for Misconfiguration and Intrusion Detection using Centralized Rule based System

by Sanjeev Sharma, Rajendra Kumar Tiwari, Rahul Kumar Gour
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 59 - Number 6
Year of Publication: 2012
Authors: Sanjeev Sharma, Rajendra Kumar Tiwari, Rahul Kumar Gour
10.5120/9552-4010

Sanjeev Sharma, Rajendra Kumar Tiwari, Rahul Kumar Gour . Enhanced Architecture for Misconfiguration and Intrusion Detection using Centralized Rule based System. International Journal of Computer Applications. 59, 6 ( December 2012), 17-22. DOI=10.5120/9552-4010

@article{ 10.5120/9552-4010,
author = { Sanjeev Sharma, Rajendra Kumar Tiwari, Rahul Kumar Gour },
title = { Enhanced Architecture for Misconfiguration and Intrusion Detection using Centralized Rule based System },
journal = { International Journal of Computer Applications },
issue_date = { December 2012 },
volume = { 59 },
number = { 6 },
month = { December },
year = { 2012 },
issn = { 0975-8887 },
pages = { 17-22 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume59/number6/9552-4010/ },
doi = { 10.5120/9552-4010 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:05:26.132487+05:30
%A Sanjeev Sharma
%A Rajendra Kumar Tiwari
%A Rahul Kumar Gour
%T Enhanced Architecture for Misconfiguration and Intrusion Detection using Centralized Rule based System
%J International Journal of Computer Applications
%@ 0975-8887
%V 59
%N 6
%P 17-22
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Web servers and web-based applications are popular attack targets. Web servers are usually accessible through corporate firewalls. The number of reported web application vulnerabilities is increasing dramatically. Thus the task of securing web applications is one of the most urgent. On the other hand traditional protection mechanisms like firewalls were not designed to protect web applications and thus do not provide adequate defense. Current attacks cannot be thwarted by just blocking ports 80 (HTTP) and 443 (HTTPS). Previously known intrusion detection systems are not efficient with more false positive alarms and more time and space complexity. In this research work a new IDS architecture is introduced which detect misconfiguration and intrusion simultaneously. There is also used a RBs (Rule Based System) which take appropriate action accordingly degree of misconfiguration. The RBs consist with predefined rule. This rules guide the system to take appropriate action. Rules are triggered as soon as it received signal for misconfigurations. The architecture designed such a way that it can handle misconfigurations and detection of intrusion simultaneously.

References
  1. Priyanka Patil1 and Ujwala Patil," Preprocessing of web server log file for web mining", World Journal of Science and Technology 2012
  2. Usman Asghar Sandhu , Sajjad Haider , Salman Naseer, Obaid Ullah Ateeb," A Survey of Intrusion Detection & Prevention Techniques ",2011
  3. Nisha Verma, Mohd Husain, Manoj Kumar Shukla," Research on Mobile agent based network intrusion", 2011
  4. Mueen Uddin, Kamran Khowaja and Azizah Abdul Rehman," Dynamic Multi-Layer Signature Based Intrusion Detection System Using Mobile Agents", 2010
  5. V. Tiwari, S. K. Lenka & S. Gupta. (June-2010)," Performance Evolution of Java Remote Method Invocation and Mobile Agent Techniques in Context of Distributed Environment" IEEE International Conference on Networking and Information Technology (ICNIT 2010) Manila, Philippines, IEEE Catalog Number:CFP1023K-PRT, ISBN:978-4244-7577-3.
  6. V. Tiwari & S. Gupta" Computational Study of . NET Remoting and Mobile Agent in Distributed Environment" International Journal of Computing, Volume 2, Issue 6, June-2010, ISSN: 2151-9617.
  7. Fakher Ben Ftima, Kamel Karoui, Henda Ben Ghezala, "Misconfigurations Discovery Between Distributed Security Components Using the Mobile Agent Approach", ACM New York, NY, USA 2009
  8. Bhushan Trivedi , Jayant Rajput , Chintan Dwivedi and Pinky Jobanputra," Distributed Intrusion Detection System using Mobile Agents", 2009
  9. Omar Abouabdalla, Homam El-Taj, Ahmed Manasrah, Sureswaran Ramadass," False Positive Reduction in Intrusion Detection System: A SURVEY", 2009
  10. Sergio Ilarri, Eduardo Mena, Arantza Illarramendi, "Using cooperative mobile agents to monirot distributed and dynamic environments", Elsevier Science Inc. New York, NY, USA 2008
  11. Álvaro Herrero, Emilio Corchado, María A. Pellicer, and Ajith Abraham, Hybrid Multi Agent-Neural Network Intrusion Detection with Mobile Visualization, 2007
  12. Yong Joon Park , Jae Chul Park ," Web Application Intrusion Detection System for Input Validation Attack", IEEE Computer Society Washington, DC, USA 2008
  13. Dalila Boughaci1, Kamel Ider2 and Sofiane Yahiaoui," Design and Implementation of a Misused Intrusion Detection System Using Autonomous and Mobile Agents" ACM 2007
  14. Pradeep Kannadiga and Mohammad Zulkernine," DIDMA: A Distributed Intrusion Detection System Using Mobile Agents",2005
  15. Shao-Chun Zhong', Qingfeng Song', Xiao-Chun Cheng, Yan Wang', A Safe Mobile Agent System for Distributed Intrusion detection, 2003
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion Detection Mobile Agent Network Security