Anomaly-based Techniques for Web Attacks Detection
نویسندگان
چکیده
منابع مشابه
Anomaly detection of web based attacks pdf
Anomaly Detection of Web-based Attacks. Christopher Kruegel chriscs.ucsb.edu. Giovanni Vigna vignacs.ucsb.edu. University of.Using Generalization and Characterization Techniques in the. Anomaly-based Detection of Web Attacks. William Robertson, Giovanni Vigna, Christopher.tem that detects web-based attacks using a number of different techniques. The anomaly detection system takes as input web s...
متن کاملUsing Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks
The custom, ad hoc nature of web applications makes learning-based anomaly detection systems a suitable approach to provide early warning about the exploitation of novel vulnerabilities. However, anomaly-based systems are known for producing a large number of false positives and for providing poor or non-existent information about the type of attack that is associated with
متن کاملMahalanobis Distance Map Approach for Anomaly Detection of Web-Based Attacks
Web servers and web-based applications are commonly used as attack targets. The main issues are how to prevent unauthorised access and to protect web servers from the attack. Intrusion Detection Systems (IDSs) are widely used security tools to detect cyber-attacks and malicious activities in computer systems and networks. In this paper, we focus on the detection of various web-based attacks usi...
متن کاملAnomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism
Today, the use of the Internet and Internet sites has been an integrated part of the people’s lives, and most activities and important data are in the Internet websites. Thus, attempts to intrude into these websites have grown exponentially. Intrusion detection systems (IDS) of web attacks are an approach to protect users. But, these systems are suffering from such drawbacks as low accuracy in ...
متن کاملAssessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing
Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Applied Computing Research
سال: 2012
ISSN: 2236-8434
DOI: 10.4013/jacr.2011.12.06