نتایج جستجو برای: web intrusion detection system

تعداد نتایج: 2839330  

2009
Carmen Torrano-Gimenez Alejandro Perez-Villegas Gonzalo Alvarez

A new system for web attack detection is presented. It follows the anomaly-based approach, therefore known and unknown attacks can be detected. The system relies on a XML file to classify the incoming requests as normal or anomalous. The XML file, which is built from only normal traffic, contains a description of the normal behavior of the target web application statistically characterized. Any...

2018
Nancy Agarwal Syed Zeeshan Hussain

Intrusion Detection System (IDS) is one of the security measures being used as an additional defence mechanism to prevent the security breaches on web. It has been well known methodology for detecting network-based attacks but still immature in the domain of securing web application. The objective of the paper is to thoroughly understand the design methodology of the detection system in respect...

2013
Matthew F. Der Barry Lawson

The increased use of the World Wide Web and JavaScript as a scripting language for Web pages have made JavaScript a popular attack vector for infecting users' machines with malware. Additionally, attackers often obfuscate their code to avoid detection, which heightens the challenge and complexity of automated defense systems. We present two analyses of malicious scripts and suggest how they cou...

Journal: :International Journal of Computer Applications 2010

Journal: :Open Computer Science 2012

2011
Iman Khalkhali Reza Azmi Mozhgan Azimpour-Kivi Mohammad Khansari

Recently, the shortcomings of current security solutions in protecting web servers and web applications against web-based attacks have encouraged many researchers to work on web intrusion detection systems (WIDSs). In this paper, a host-based web anomaly detection system is presented which analyzes the POST and GET requests processed and logged in web servers’ access log files. A special kind o...

2014
B. B. Meshram Suresh Patil

Application protection is a valuable security layer to protect against a number of application layer security threats which is usually not protected by a typical network layer intrusion detection system. The hackers will attack the Web Application using the methods like structured Query Language (SQL) Injection, Cross Site Scripting (XSS), Command Injection, cookie poisoning, etc. These problem...

2003
Yu-Sung Wu Bingrui Foo Yongguo Mei Saurabh Bagchi

In this paper, we present the design and implementation of a Collaborative Intrusion Detection System (CIDS) for accurate and efficient intrusion detection in a distributed system. CIDS employs multiple specialized detectors at the different layers – network, kernel and application – and a manager based framework for aggregating the alarms from the different detectors to provide a combined alar...

2015
Abhishek Sawant Jyoti Yadav Avneet Kaur Arora Janhavi Deo

This paper analysis and criticizes the way of using, functioning the intrusion detection system in data mining. Understanding the techniques. A survey on Data Mining based Intrusion Detection Systems phase, intrusion detection system is studied. are analysed using any network administrator. 1Data Mining and Optimization Research Group (DMO), Centre for Artificial Intrusion Detection System (IDS...

2007
Frédéric Majorczyk Éric Totel Ludovic Mé

COTS (Components-Off-The-Shelf) diversity has been proposed by many recent projects to ensure intrusion detection and tolerance. However using COTS in a N-version architecture presents some drawbacks, especially in intrusion detection, which have consequences on intrusion tolerance. COTS Diversity is prone to raise many false positives (false alerts). In this article, we explain what a COTS Div...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید