Review Article

A Closer Look at Intrusion Detection System for Web Applications

Table 4

Comparison of IDS.

ReferenceDetection ApproachIDS TypeData Monitored TypeStateIDS ModeResponse MechanismAttack DescriptionIncremental LearningSecurity Measures

[29]SDHIDSLogsStatefulDetectionPassiveNoNoIV
AC
BD
[26]ADHIDSLogs, GetStatelessDetectionPassiveNoNoIV
[27]SDHIDSLogs, Get,
Post, Header
StatefulDetectionPassiveNoNoIV
AC
SV
[30]PDHIDSGet, Post,
Header
StatefulPreventionActive
&
Dynamic
YesNoIV
AC
[17]HDHIDSGet, HeaderStatelessDetectionPassiveNoNoIV
[22]ADHIDSLogs, GetStatefulDetectionPassiveNoNoIV
BD
[33]SDHIDSLogsStatefulDetectionPassiveNoNoAC
[31]ADHIDSLogs, GetStatelessDetectionPassiveYesNoIV
[32]ADHIDSGetStatelessPreventionActive
&
Dynamic
NoNoIV
[28]ADHIDSApplication
Variables
StatefulDetectionPassiveNoNoIV
AC
[34]ADHIDSGet, Post, HeaderStatelessDetectionPassiveNoYesIV
[35]ADNIDSGet, HeaderStatelessDetectionPassiveNoNoIV
[36]ADHIDSGet, Post, HeaderStatelessDetectionPassiveNoNoIV
[38]ADHIDSGet, Post, ResponseStatelessDetectionPassiveNoYesIV
[39]ADHIDSGetStatelessPreventionActive
&
Dynamic
NoYesIV
AC
[40]ADNIDSLogs, Get, PostStatelessDetectionPassiveNoNoIV
[41]ADHIDSGetStatelessDetectionPassiveNoNoIV
[42]PDHIDSGet, Post, HeaderStatelessDetectionPassiveNoYesIV
[43]ADHIDSGet, Post, Header
StatelessPreventionActive
&
Dynamic
NoNoIV
[44]ADHIDSGet, HeaderStatelessDetectionPassiveNoNoIV
[45]ADHIDSGet, Post, HeaderStatelessDetectionPassiveNoNoIV
[46]ADNIDSGet, Post, HeaderStatelessDetectionPassiveYesYesIV
[23]ADHIDSApplication
Variables
StatefulDetectionPassiveNoNoIV
AC
[47]ADHIDSGet, Post, HeaderStatefulDetectionPassiveNoNoAC
SV
[48]ADNIDSGet, Post, HeaderStatelessDetectionPassiveNoNoIV
[16]HDHIDSGet, Post, HeaderStatelessPreventionActive
&
Dynamic
NoNoIV
BD
[49]PDHIDSGet, Post,
Header, Response
StatefulPreventionActive
&
Static
YesNoIV
AC
SV
OV
[50]PDHIDSGet, Post, HeaderStatelessPreventionActive
&
Static
YesNoIV
[51]ADNIDSGet, Post, HeaderStatelessDetectionPassiveYesNoIV
[52]HDHIDSGet, Post, HeaderStatefulDetectionPassiveNoYesIV
BD

AD: Anomaly-based Detection IV: Input Validation.
SD: Signature-based Detection OV: Output Validation.
PD: Policy-based Detection. AC: Access Control.
HD: Hybrid-based Detection. SV: Session Verification.
HIDS: Host-based Intrusion Detection System. BD: Bot Detection.
NIDS: Network-based Intrusion Detection System.