Research Article Open Access

Handling Web and Database Requests Using Fuzzy Rules for Anomaly Intrusion Detection

Selvamani Kadirvelu and Kannan Arputharaj

Abstract

Problem statement: It is necessary to propose suitable detection and prevention mechanisms to provide security for the information contents used by the web application. Many prevention mechanisms which are currently available are not able to classify anomalous, random and normal request. This leads to the problem of false positives which is classifying a normal request as anomalous and denying access to information. Approach: In this study, we propose an anomaly detection system which will act as a Web based anomaly detector called intelligent SQL Anomaly detector and it uses decision tree algorithm and a feedback mechanism for effective classification. Results: This newly proposed and implemented technique has higher probability for reducing false positives which are the drawbacks in the earlier systems. Hence, our system proves that it detects all anomalies and shows better results when compared with the existing system. Conclusion: A refreshing technique to improve the detection rate of web-based intrusion detection systems by serially framing a web request anomaly detector using fuzzy rules has been proposed and implemented and this system proves to be more efficient then the existing earlier system when compared with the obtained results.

Journal of Computer Science
Volume 7 No. 2, 2011, 255-261

DOI: https://doi.org/10.3844/jcssp.2011.255.261

Submitted On: 17 December 2010 Published On: 25 February 2011

How to Cite: Kadirvelu, S. & Arputharaj, K. (2011). Handling Web and Database Requests Using Fuzzy Rules for Anomaly Intrusion Detection. Journal of Computer Science, 7(2), 255-261. https://doi.org/10.3844/jcssp.2011.255.261

  • 3,374 Views
  • 2,597 Downloads
  • 1 Citations

Download

Keywords

  • SQL anomaly detection
  • fuzzy rule
  • access control
  • feedback propagation
  • Intrusion Detection System (IDS)
  • anomaly detection system
  • propagation algorithm
  • encrypted data
  • HTTP proxy