Enhancing community SQL injection rule in intrusion detection system using snort with email notifications / Nur Athirah Noor Mohamad, Noor Ashitah Abu Othman and Mohd Hafifi Mohd Supir

This project focuses on enhancing the precision and recall rates of community-based intrusion detection systems, specifically targeting SQL injection attacks within the context of Snort. The study involves the integration of modified rules employing PCRE (Perl Compatible Regular Expressions) and fas...

Full description

Saved in:
Bibliographic Details
Main Authors: Noor Mohamad, Nur Athirah, Abu Othman, Noor Ashitah, Mohd Supir, Mohd Hafifi
Format: Article
Language:English
Published: College of Computing, Informatics, and Mathematics 2024
Subjects:
Online Access:https://ir.uitm.edu.my/id/eprint/105867/1/105867.pdf
https://ir.uitm.edu.my/id/eprint/105867/
https://fskmjebat.uitm.edu.my/pcmj/
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:This project focuses on enhancing the precision and recall rates of community-based intrusion detection systems, specifically targeting SQL injection attacks within the context of Snort. The study involves the integration of modified rules employing PCRE (Perl Compatible Regular Expressions) and fast pattern matching to improve the accuracy and performance of the intrusion detection system. Experimental results demonstrate a notable reduction in false positives and a perfect recall rate, showcasing the efficacy of the enhanced rules. The virtualized testing environment, comprising a Snort-protected server, a simulated attacker using Kali Linux and Metasploitable 2, and a vulnerable system facilitates a thorough evaluation of Snort's response to cyber threats. While acknowledging limitations and the controlled nature of the testing, this research emphasizes the importance of leveraging advanced technologies to fortify intrusion detection systems against evolving cybersecurity challenges. The incorporation of PCRE and fast pattern matching stands as a significant contribution to improving rule matching accuracy and overall system efficiency in the dynamic landscape of cybersecurity.