ORCID Profile
0000-0002-7556-6274
Current Organisation
Deakin University
Does something not look right? The information on this page has been harvested from data sources that may not be up to date. We continue to work with information providers to improve coverage and quality. To report an issue, use the Feedback Form.
Publisher: IGI Global
Date: 04-2013
Abstract: The continuously rising Internet attacks pose severe challenges to develop an effective Intrusion Detection System (IDS) to detect known and unknown malicious attack. In order to address the problem of detecting known, unknown attacks and identify an attack grouped, the authors provide a new multi stage rules for detecting anomalies in multi-stage rules. The authors used the RIPPER for rule generation, which is capable to create rule sets more quickly and can determine the attack types with smaller numbers of rules. These rules would be efficient to apply for Signature Intrusion Detection System (SIDS) and Anomaly Intrusion Detection System (AIDS).
Publisher: IGI Global
Date: 2013
DOI: 10.4018/978-1-4666-3926-3.CH012
Abstract: Web applications have steadily increased, making them very important in areas, such as financial sectors, e-commerce, e-government, social media network, medical data, e-business, academic an activities, e-banking, e-shopping, e-mail. However, web application pages support users interacting with the data stored in their website to insert, delete and modify content by making a web site their own space. Unfortunately, these activities attracted writers of malicious software for financial gain, and to take advantage of such activities to perform their malicious objectives. This chapter focuses on severe threats to web applications specifically on Structure Query Language Injection Attack (SQLIA) and Zeus threats. These threats could adopt new obfuscation techniques to evade and thwart countermeasures Intrusion Detection Systems (IDS). Furthermore, this work explores and discusses the techniques to detect and prevent web application malware.
Publisher: IEEE
Date: 07-2013
Publisher: IEEE
Date: 2008
Publisher: Wiley
Date: 08-03-2013
DOI: 10.1002/CPE.3010
Publisher: IEEE
Date: 06-2012
Publisher: Elsevier BV
Date: 04-2002
Publisher: IEEE
Date: 10-2012
Publisher: Springer Berlin Heidelberg
Date: 2011
Publisher: IEEE
Date: 07-2013
Publisher: Emerald
Date: 10-11-2014
DOI: 10.1108/IMCS-02-2013-0007
Abstract: – The purpose of this paper is to mitigate vulnerabilities in web applications, security detection and prevention are the most important mechanisms for security. However, most existing research focuses on how to prevent an attack at the web application layer, with less work dedicated to setting up a response action if a possible attack happened. – A combination of a Signature-based Intrusion Detection System (SIDS) and an Anomaly-based Intrusion Detection System (AIDS), namely, the Intelligent Intrusion Detection and Prevention System (IIDPS). – After evaluating the new system, a better result was generated in line with detection efficiency and the false alarm rate. This demonstrates the value of direct response action in an intrusion detection system. – Data limitation. – The contributions of this paper are to first address the problem of web application vulnerabilities. Second, to propose a combination of an SIDS and an AIDS, namely, the IIDPS. Third, this paper presents a novel approach by connecting the IIDPS with a response action using fuzzy logic. Fourth, use the risk assessment to determine an appropriate response action against each attack event. Combining the system provides a better performance for the Intrusion Detection System, and makes the detection and prevention more effective.
Publisher: IEEE
Date: 06-2008
DOI: 10.1109/NAS.2008.67
Publisher: Springer Berlin Heidelberg
Date: 2001
Publisher: IEEE
Date: 2007
Publisher: Springer Berlin Heidelberg
Date: 2013
Publisher: Academy Publisher
Date: 06-2012
Publisher: IEEE Comput. Soc
Date: 2000
Publisher: Springer Berlin Heidelberg
Date: 2011
Publisher: Springer US
Date: 2005
Publisher: IGI Global
Date: 2014
DOI: 10.4018/978-1-4666-4789-3.CH002
Abstract: Cybercriminals continue to target online users of banks. They are improving their techniques and using high levels of skill in their attacks. Their continued search for different methods to commit crime makes the existing protection system less effective. They have developed crime toolkits which have become more accessible and simpler to use, and this has attracted more cybercriminals to cybercrime. In this chapter, the authors study the methods that are used in crime toolkits. They present the development and current trend of crime toolkits and reveal the methods that have been used to commit cybercrime successfully.
Publisher: Springer Berlin Heidelberg
Date: 2010
Publisher: Elsevier BV
Date: 11-2000
Publisher: IEEE
Date: 06-2012
Publisher: IEEE
Date: 07-2013
Publisher: Springer Berlin Heidelberg
Date: 2011
No related grants have been discovered for Michael Hobbs.