首页> 外文期刊>Computers & Security >Ontology for attack detection: An intelligent approach to web application security
【24h】

Ontology for attack detection: An intelligent approach to web application security

机译:攻击检测的本体:Web应用程序安全性的智能方法

获取原文
获取原文并翻译 | 示例

摘要

Conventional detection techniques struggle to keep up with the inherent complexity of web application design and hence the ever growing variety of attacks that can exploit it. Security frameworks modeled using an ontological approach are a promising new line of defense that can be highly effective in detecting zero day and sophisticated web application attacks because they can capture the context of the contents of information such as HTML pages or in-line scripts and have the ability to filter these contents by taking into consideration their consequences to the target applications. The goal of this article is to demonstrate how an ontology-engineering methodology may be systematically applied for designing and evaluating such security systems. A detailed ontological model is shown that caters to the generalized working of web applications, the underlying communication protocols and attacks. More specifically the proposed ontological model because it captures the context can not only detect HTTP protocol specification attacks but also helps focus only on specific portions of the request and response where a malicious script is possible. The model also captures the context of important attacks, the various technologies used by the hackers, source, target and vulnerabilities exploited by the attack, impact on system components and controls for mitigation. A comprehensive and best metrics suite for ontology evaluation has been used for assessing the quality of proposed model which includes correctness, accuracy, consistency, soundness, task orientation, completeness, conciseness, expandability, reusability, clarity, integrity, efficiency and expressiveness. The proposed model ranked well against the above mentioned metrics. Moreover a prototype attack detection system based upon the proposed model showed improved performance and detection rate and low rate of false positives while detecting OWASP's top ten listed web attacks.
机译:常规的检测技术难以跟上Web应用程序设计的固有复杂性,因此无法利用不断增长的各种攻击来利用它。使用本体论方法建模的安全框架是很有前途的新防线,可以有效检测零日攻击和复杂的Web应用程序攻击,因为它们可以捕获诸如HTML页面或嵌入式脚本之类的信息内容的上下文,并且具有通过考虑它们对目标应用程序的影响来过滤这些内容的能力。本文的目的是演示如何将本体工程方法学系统地用于设计和评估此类安全系统。显示了详细的本体模型,该模型可满足Web应用程序的一般工作,底层的通信协议和攻击。更具体而言,所提出的本体模型是因为它捕获了上下文,不仅可以检测HTTP协议规范攻击,而且还可以仅集中于请求和响应中可能存在恶意脚本的特定部分。该模型还捕获了重要攻击的上下文,黑客使用的各种技术,攻击所利用的源,目标和漏洞,对系统组件的影响以及缓解措施。一个用于本体评估的全面,最佳的度量套件已用于评估所提议模型的质量,其中包括正确性,准确性,一致性,健全性,任务导向,完整性,简洁性,可扩展性,可重用性,清晰度,完整性,效率和表达性。相对于上述指标,建议的模型排名很好。此外,基于所提出模型的原型攻击检测系统在检测OWASP列出的十大网络攻击的同时,还提高了性能和检测率,降低了误报率。

著录项

  • 来源
    《Computers & Security》 |2014年第9期|124-146|共23页
  • 作者单位

    School of Electrical Engineering and Computer Science (SEECS), National University of Sciences and Technology, Islamabad, Pakistan;

    School of Electrical Engineering and Computer Science (SEECS), National University of Sciences and Technology, Islamabad, Pakistan;

    School of Electrical Engineering and Computer Science (SEECS), National University of Sciences and Technology, Islamabad, Pakistan,College of Computer Sciences and Information Technology (CCSIT), King Faisal University, Alahssa 31982, Kingdom of Saudi Arabia;

    School of Electrical Engineering and Computer Science (SEECS), National University of Sciences and Technology, Islamabad, Pakistan;

    School of Electrical Engineering and Computer Science (SEECS), National University of Sciences and Technology, Islamabad, Pakistan;

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Web application security; Ontology based intelligent system; Semantic security; Cyber security; Information security;

    机译:Web应用程序的安全性;基于本体的智能系统;语义安全;网络安全;信息安全;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号