Title of article :
Semantic security against web application attacks
Author/Authors :
Abdul Razzaq، نويسنده , , Khalid Latif Awan، نويسنده , , H. Farooq Ahmad، نويسنده , , Ali Hur، نويسنده , , Zahid Anwar، نويسنده , , Peter Charles Bloodsworth، نويسنده ,
Issue Information :
روزنامه با شماره پیاپی سال 2014
Pages :
20
From page :
19
To page :
38
Abstract :
In this paper, we propose a method of detecting and classifying web application attacks. In contrast to current signature-based security methods, our solution is an ontology based technique. It specifies web application attacks by using semantic rules, the context of consequence and the specifications of application protocols. The system is capable of detecting sophisticated attacks effectively and efficiently by analyzing the specified portion of a user request where attacks are possible. Semantic rules help to capture the context of the application, possible attacks and the protocol that was used. These rules also allow inference to run over the ontological models in order to detect, the often complex polymorphic variations of web application attacks. The ontological model was developed using Description Logic that was based on the Web Ontology Language (OWL). The inference rules are Horn Logic statements and are implemented using the Apache JENA framework. The system is therefore platform and technology independent. Prior to the evaluation of the system the knowledge model was validated by using OntoClean to remove inconsistency, incompleteness and redundancy in the specification of ontological concepts. The experimental results show that the detection capability and performance of our system is significantly better than existing state of the art solutions. The system successfully detects web application attacks whilst generating few false positives. The examples that are presented demonstrate that a semantic approach can be used to effectively detect zero day and more sophisticated attacks in a real-world environment.
Keywords :
Semantic rule engine , Semantic security , Application security
Journal title :
Information Sciences
Serial Year :
2014
Journal title :
Information Sciences
Record number :
1215866
Link To Document :
بازگشت