Rules Based Analysis Engine for Application Layer IDS
Web application attack volume, complexity, and costs have risen as people, companies, and entire industries move online. Solutions implemented to defend web applications against malicious activity have traditionally been implemented at the network or host layer. While this is helpful for detecting s...
Main Author: | |
---|---|
Format: | Others |
Published: |
DigitalCommons@CalPoly
2017
|
Subjects: | |
Online Access: | https://digitalcommons.calpoly.edu/theses/1773 https://digitalcommons.calpoly.edu/cgi/viewcontent.cgi?article=2954&context=theses |
id |
ndltd-CALPOLY-oai-digitalcommons.calpoly.edu-theses-2954 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-CALPOLY-oai-digitalcommons.calpoly.edu-theses-29542021-09-14T05:01:36Z Rules Based Analysis Engine for Application Layer IDS Scrobonia, David Web application attack volume, complexity, and costs have risen as people, companies, and entire industries move online. Solutions implemented to defend web applications against malicious activity have traditionally been implemented at the network or host layer. While this is helpful for detecting some attacks, it does not provide the gran- ularity to see malicious behavior occurring at the application layer. The AppSensor project, an application level intrusion detection system (IDS), is an example of a tool that operates in this layer. AppSensor monitors users within the application by observing activity in suspicious areas not able to be seen by traditional network layer tools. This thesis aims to improve the state of web application security by supporting the development of the AppSensor project. Specifically, this thesis entails contributing a rules-based analysis engine to provide a new method for determining whether suspicious activity constitutes an attack. The rules-based method aggregates information from multiple sources into a logical rule to identify malicious activity, as opposed to relying on a single source of information. The rules-based analysis engine is designed to offer more flexible configuration for administrators and more accurate results than the incumbent analysis engine. Tests indicate that the new engine should not hamper the performance of AppSensor and use cases highlight how rules can be leveraged for more accurate results. 2017-05-01T07:00:00Z text application/pdf https://digitalcommons.calpoly.edu/theses/1773 https://digitalcommons.calpoly.edu/cgi/viewcontent.cgi?article=2954&context=theses Master's Theses DigitalCommons@CalPoly web application security security intrustion detection system appsensor rule engine owasp Digital Communications and Networking |
collection |
NDLTD |
format |
Others
|
sources |
NDLTD |
topic |
web application security security intrustion detection system appsensor rule engine owasp Digital Communications and Networking |
spellingShingle |
web application security security intrustion detection system appsensor rule engine owasp Digital Communications and Networking Scrobonia, David Rules Based Analysis Engine for Application Layer IDS |
description |
Web application attack volume, complexity, and costs have risen as people, companies, and entire industries move online. Solutions implemented to defend web applications against malicious activity have traditionally been implemented at the network or host layer. While this is helpful for detecting some attacks, it does not provide the gran- ularity to see malicious behavior occurring at the application layer. The AppSensor project, an application level intrusion detection system (IDS), is an example of a tool that operates in this layer. AppSensor monitors users within the application by observing activity in suspicious areas not able to be seen by traditional network layer tools. This thesis aims to improve the state of web application security by supporting the development of the AppSensor project. Specifically, this thesis entails contributing a rules-based analysis engine to provide a new method for determining whether suspicious activity constitutes an attack. The rules-based method aggregates information from multiple sources into a logical rule to identify malicious activity, as opposed to relying on a single source of information. The rules-based analysis engine is designed to offer more flexible configuration for administrators and more accurate results than the incumbent analysis engine. Tests indicate that the new engine should not hamper the performance of AppSensor and use cases highlight how rules can be leveraged for more accurate results. |
author |
Scrobonia, David |
author_facet |
Scrobonia, David |
author_sort |
Scrobonia, David |
title |
Rules Based Analysis Engine for Application Layer IDS |
title_short |
Rules Based Analysis Engine for Application Layer IDS |
title_full |
Rules Based Analysis Engine for Application Layer IDS |
title_fullStr |
Rules Based Analysis Engine for Application Layer IDS |
title_full_unstemmed |
Rules Based Analysis Engine for Application Layer IDS |
title_sort |
rules based analysis engine for application layer ids |
publisher |
DigitalCommons@CalPoly |
publishDate |
2017 |
url |
https://digitalcommons.calpoly.edu/theses/1773 https://digitalcommons.calpoly.edu/cgi/viewcontent.cgi?article=2954&context=theses |
work_keys_str_mv |
AT scroboniadavid rulesbasedanalysisengineforapplicationlayerids |
_version_ |
1719480506799620096 |