Semantic System for Attacks and Intrusions Detection

Semantic System for Attacks and Intrusions Detection

Abdeslam El Azzouzi, Kamal Eddine El Kadiri
Copyright: © 2015 |Volume: 7 |Issue: 4 |Pages: 14
ISSN: 1941-6210|EISSN: 1941-6229|EISBN13: 9781466676961|DOI: 10.4018/IJDCF.2015100102
Cite Article Cite Article

MLA

El Azzouzi, Abdeslam, and Kamal Eddine El Kadiri. "Semantic System for Attacks and Intrusions Detection." IJDCF vol.7, no.4 2015: pp.19-32. http://doi.org/10.4018/IJDCF.2015100102

APA

El Azzouzi, A. & El Kadiri, K. E. (2015). Semantic System for Attacks and Intrusions Detection. International Journal of Digital Crime and Forensics (IJDCF), 7(4), 19-32. http://doi.org/10.4018/IJDCF.2015100102

Chicago

El Azzouzi, Abdeslam, and Kamal Eddine El Kadiri. "Semantic System for Attacks and Intrusions Detection," International Journal of Digital Crime and Forensics (IJDCF) 7, no.4: 19-32. http://doi.org/10.4018/IJDCF.2015100102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The increasing development of information systems complicate task of protecting against threats. They have become vulnerable to malicious attacks that may affect the essential properties such as confidentiality, integrity and availability. Then the security becomes an overriding concern. Securing a system begins with prevention methods that are insufficient to reduce the danger of attacks, that must be accomplished by intrusion and attack detection systems. In this paper, a method for detecting web application attacks is proposed. Unlike methods based on signatures, the proposed solution is a technique based on ontology. It describes the Web attacks, the HTTP request, and the application using semantic rules. The system is able to detect effectively the sophisticated attacks by analysing user requests. The semantic rules allow inference about the ontologies models to detect complex variations of web attacks. The ontologies models was developed using description logics which was based Web Ontology Language (OWL). The proposed system is able to be installed on an HTTP server.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.