Rules Based Analysis Engine for Application Layer IDS

Web application attack volume, complexity, and costs have risen as people, companies, and entire industries move online. Solutions implemented to defend web applications against malicious activity have traditionally been implemented at the network or host layer. While this is helpful for detecting s...

Full description

Bibliographic Details
Main Author: Scrobonia, David
Format: Others
Published: DigitalCommons@CalPoly 2017
Subjects:
Online Access:https://digitalcommons.calpoly.edu/theses/1773
https://digitalcommons.calpoly.edu/cgi/viewcontent.cgi?article=2954&context=theses
id ndltd-CALPOLY-oai-digitalcommons.calpoly.edu-theses-2954
record_format oai_dc
spelling ndltd-CALPOLY-oai-digitalcommons.calpoly.edu-theses-29542021-09-14T05:01:36Z Rules Based Analysis Engine for Application Layer IDS Scrobonia, David Web application attack volume, complexity, and costs have risen as people, companies, and entire industries move online. Solutions implemented to defend web applications against malicious activity have traditionally been implemented at the network or host layer. While this is helpful for detecting some attacks, it does not provide the gran- ularity to see malicious behavior occurring at the application layer. The AppSensor project, an application level intrusion detection system (IDS), is an example of a tool that operates in this layer. AppSensor monitors users within the application by observing activity in suspicious areas not able to be seen by traditional network layer tools. This thesis aims to improve the state of web application security by supporting the development of the AppSensor project. Specifically, this thesis entails contributing a rules-based analysis engine to provide a new method for determining whether suspicious activity constitutes an attack. The rules-based method aggregates information from multiple sources into a logical rule to identify malicious activity, as opposed to relying on a single source of information. The rules-based analysis engine is designed to offer more flexible configuration for administrators and more accurate results than the incumbent analysis engine. Tests indicate that the new engine should not hamper the performance of AppSensor and use cases highlight how rules can be leveraged for more accurate results. 2017-05-01T07:00:00Z text application/pdf https://digitalcommons.calpoly.edu/theses/1773 https://digitalcommons.calpoly.edu/cgi/viewcontent.cgi?article=2954&context=theses Master's Theses DigitalCommons@CalPoly web application security security intrustion detection system appsensor rule engine owasp Digital Communications and Networking
collection NDLTD
format Others
sources NDLTD
topic web application security
security
intrustion detection system
appsensor
rule engine
owasp
Digital Communications and Networking
spellingShingle web application security
security
intrustion detection system
appsensor
rule engine
owasp
Digital Communications and Networking
Scrobonia, David
Rules Based Analysis Engine for Application Layer IDS
description Web application attack volume, complexity, and costs have risen as people, companies, and entire industries move online. Solutions implemented to defend web applications against malicious activity have traditionally been implemented at the network or host layer. While this is helpful for detecting some attacks, it does not provide the gran- ularity to see malicious behavior occurring at the application layer. The AppSensor project, an application level intrusion detection system (IDS), is an example of a tool that operates in this layer. AppSensor monitors users within the application by observing activity in suspicious areas not able to be seen by traditional network layer tools. This thesis aims to improve the state of web application security by supporting the development of the AppSensor project. Specifically, this thesis entails contributing a rules-based analysis engine to provide a new method for determining whether suspicious activity constitutes an attack. The rules-based method aggregates information from multiple sources into a logical rule to identify malicious activity, as opposed to relying on a single source of information. The rules-based analysis engine is designed to offer more flexible configuration for administrators and more accurate results than the incumbent analysis engine. Tests indicate that the new engine should not hamper the performance of AppSensor and use cases highlight how rules can be leveraged for more accurate results.
author Scrobonia, David
author_facet Scrobonia, David
author_sort Scrobonia, David
title Rules Based Analysis Engine for Application Layer IDS
title_short Rules Based Analysis Engine for Application Layer IDS
title_full Rules Based Analysis Engine for Application Layer IDS
title_fullStr Rules Based Analysis Engine for Application Layer IDS
title_full_unstemmed Rules Based Analysis Engine for Application Layer IDS
title_sort rules based analysis engine for application layer ids
publisher DigitalCommons@CalPoly
publishDate 2017
url https://digitalcommons.calpoly.edu/theses/1773
https://digitalcommons.calpoly.edu/cgi/viewcontent.cgi?article=2954&context=theses
work_keys_str_mv AT scroboniadavid rulesbasedanalysisengineforapplicationlayerids
_version_ 1719480506799620096