HOME JOURNALS CONTACT

Information Technology Journal

Year: 2013 | Volume: 12 | Issue: 24 | Page No.: 7952-7958
DOI: 10.3923/itj.2013.7952.7958
For Deformation Web Attacks Based on Feature Recognition IPS Intrusion Prevention Technology Research
Tao Yan and Yifei Zhang

Abstract: The study analyzes the characteristics of various types of Web application system security vulnerabilities. Based on the deformation of Web attack, according to the principle of Web application vulnerabilities occur, attack methods and targets, the attack characteristics is extended, Proposed a structural model of intrusion prevention based on the feature recognition. The experiments showed that the feature recognition-based Intrusion Prevention System can ensure higher performance in high-speed attack traffic network environment.

Fulltext PDF

How to cite this article
Tao Yan and Yifei Zhang, 2013. For Deformation Web Attacks Based on Feature Recognition IPS Intrusion Prevention Technology Research. Information Technology Journal, 12: 7952-7958.

Keywords: Web security vulnerabilities, deformation of the attack, feature recognition and intrusion prevention

REFERENCES

  • Al-Canaan, A.M. and A. Khoumsi, 2011. Multimedia web services performance: Analysis and quantification of binary data compression. J. Multimedia, 6: 447-457.
    Direct Link    


  • Frederic, L., M.D. Benedetto, M. Dellepiane and R. Scopigno, 2012. From the digitization of cultural artifacts to the web publishing of digital 3D collections: An automatic pipeline for knowledge sharing. J. Multimedia, 7: 132-144.
    CrossRef    Direct Link    


  • Du, J.N. and Y.S. Lu, 2009. Taxonomy of Web-based application vulnerabilities. Comput. Eng. Appl. J., 45: 10-14.


  • Kayacik, H.G., A.N. Zincir-Heywood and M.I. Heywood, 2007. A hierarchical SOM-based intrusion detection system. Comput. Eng. Sci. J., 20: 439-451.
    CrossRef    Direct Link    


  • Yang, K.Z. and F. Jiang, 2006. Study on the uniform description of security vulnerabilities computer. Eng. Sci. J., 28: 11-12.


  • Wang, T.F., Y.W. Li and Y.B. Sheng, 2009. Honeynet-based network security defense model. Appl. Res. Comput. J., 26: 3012-3014.
    Direct Link    


  • Du, Y., J.Q. Liu, R.H. Zhang and J.Y. Li, 2011. A dynamic security mechanism for web services based on NDIS intermediate drivers. J. Comput., 6: 2021-2028.
    Direct Link    

  • © Science Alert. All Rights Reserved