skip to main content
10.1145/3650400.3650650acmotherconferencesArticle/Chapter ViewAbstractPublication PageseitceConference Proceedingsconference-collections
research-article

Research on intrusion detection based on Boyer-Moore pattern matching algorithm

Published: 17 April 2024 Publication History

Abstract

The security of WEB applications has always been an important research direction in the field of network security. Intrusion detection based on WEB logs is a common detection method. It analyzes the access logs of the WEB server to detect malicious requests and attack behaviors, thereby protecting the security of WEB applications. In this article, we will discuss an intrusion detection method based on the Boyer-Moore algorithm to prevent SQL injection and XSS attacks. This method is based on the pattern matching algorithm Boyer-Moore. It uses misuse detection technology to compare log information with known feature values to determine whether an attack has occurred, and displays the detection results to the user through a visual interface to help users Better understand the current security landscape. The experiment verified the effectiveness and feasibility of the intrusion detection system based on Boyer-Moore pattern matching algorithm, which can provide strong security guarantee for WEB applications.

References

[1]
Winfred Y, Charity M Y B, Ebenezer O. 2023. Estimating Overhead Performance of Supervised Machine Learning Algorithms for Intrusion Detection[J]. International Journal of Information Technologies and Systems Approach (IJITSA) 2023,16(1).
[2]
Mariam I, Ruba E. 2023. Modeling an intrusion detection using recurrent neural networks[J]. Journal of Engineering Research 2023, 11(1).
[3]
Ponmaniraj S, Kumar T D, Goel K A D. 2020. WEB INTRUSION DETECTION SYSTEM: IDENTIFICATION OF WEB SERVER RELIABILITY ON INTERNET CONNECTIONS THROUGH LOG FILE PREPROCESSING[J]. Journal of Critical Reviews 2020,7(18).
[4]
Charu G, Kumar R S, Kumar A M. GeneMiner. 2022. A Classification Approach for Detection of XSS Attacks on Web Services[J]. Computational Intelligence and Neuroscience.
[5]
Rong C. 2022 Design and Protection Strategy of Distributed Intrusion Detection System in Big Data Environment[J]. Computational Intelligence and Neuroscience.
[6]
Obeidat I, AlZubi M. 2019. Developing a faster pattern matching algorithms for intrusion detection system[J]. International Journal of Computing, 2019, 18(3) 278-284.
[7]
Mohammed N, Ashaar A, Malik Q, 2023. A systematic review of detection and prevention techniques of SQL injection attacks[J]. Information Security Journal: A Global Perspective, 2023,32(4).
[8]
Duan Y, Long H,Qu Q Y. 2020. Application of Improved BM Algorithm in String Approximate Matching[J]. Procedia Computer Science 2020,166(C).
[9]
Masdari M, Khezri H. 2020. A survey and taxonomy of the fuzzy signature-based Intrusion Detection Systems[J]. Applied Soft Computing Journal, 2020,92(prepublish).
[10]
Chaudhary P, Gupta B. 2018. Plague of cross-site scripting on web applications: a review, taxonomy and challenges[J]. Int. J. of Web Based Communities 2018,14(1).
[11]
Rahmat F R, Prayoga F D, Gunawan D, 2018. Boyer-Moore Algorithm in Retrieving Deleted Short Message Service in Android Platform[J]. IOP Conference Series: Materials Science and Engineering 2018,14(1).

Index Terms

  1. Research on intrusion detection based on Boyer-Moore pattern matching algorithm

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    EITCE '23: Proceedings of the 2023 7th International Conference on Electronic Information Technology and Computer Engineering
    October 2023
    1809 pages
    ISBN:9798400708305
    DOI:10.1145/3650400
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 17 April 2024

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    EITCE 2023

    Acceptance Rates

    Overall Acceptance Rate 508 of 972 submissions, 52%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 24
      Total Downloads
    • Downloads (Last 12 months)24
    • Downloads (Last 6 weeks)7
    Reflects downloads up to 08 Mar 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media