AIWAS: The Automatic Identification of Web Attacks System

AIWAS: The Automatic Identification of Web Attacks System

Toan Huynh, James Miller
Copyright: © 2012 |Volume: 3 |Issue: 1 |Pages: 19
ISSN: 1947-3052|EISSN: 1947-3060|EISBN13: 9781466614390|DOI: 10.4018/jssoe.2012010105
Cite Article Cite Article

MLA

Huynh, Toan, and James Miller. "AIWAS: The Automatic Identification of Web Attacks System." IJSSOE vol.3, no.1 2012: pp.73-91. http://doi.org/10.4018/jssoe.2012010105

APA

Huynh, T. & Miller, J. (2012). AIWAS: The Automatic Identification of Web Attacks System. International Journal of Systems and Service-Oriented Engineering (IJSSOE), 3(1), 73-91. http://doi.org/10.4018/jssoe.2012010105

Chicago

Huynh, Toan, and James Miller. "AIWAS: The Automatic Identification of Web Attacks System," International Journal of Systems and Service-Oriented Engineering (IJSSOE) 3, no.1: 73-91. http://doi.org/10.4018/jssoe.2012010105

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

A recent report states that 63 percent of documented vulnerabilities exist in Web applications. Hence, Web applications represent an ideal platform for malicious attackers to target. This paper presents an anomaly intrusion detection system (AIWAS) to help system administrators protect their Web applications from these attacks. AIWAS maps each user’s input into an Instance Model (IM). The IM, which contains attackable features of the input, allows machine learning algorithms to classify the input as either benign or malicious. AIWAS then prevents malicious inputs from reaching the protected Web applications. A case study demonstrates the effectiveness of AIWAS against actual attacks.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.