메뉴 건너뛰기




Volumn 48, Issue 5, 2005, Pages 717-738

A multi-model approach to the detection of web-based attacks

Author keywords

Anomaly Models; Intrusion Detection; Machine Learning; World Wide Web

Indexed keywords

ERROR DETECTION; LEARNING SYSTEMS; MATHEMATICAL MODELS; PARAMETER ESTIMATION; SECURITY SYSTEMS; SERVERS;

EID: 18844395404     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2005.01.009     Document Type: Article
Times cited : (199)

References (48)
  • 2
    • 84947584994 scopus 로고    scopus 로고
    • Application-integrated data collection for security monitoring
    • Proceedings of recent advances in intrusion detection (RAID), Davis, CA, October 2001, Springer
    • M. Almgren, and U. Lindqvist Application-integrated data collection for security monitoring Proceedings of recent advances in intrusion detection (RAID), Davis, CA, October 2001 LNCS 2001 Springer 22 36
    • (2001) LNCS , pp. 22-36
    • Almgren, M.1    Lindqvist, U.2
  • 5
    • 8644227174 scopus 로고    scopus 로고
    • Exploiting Buffer Overflow In IIS Indexing Service DLL, Advisory CA-2001-19, July
    • CERT/CC, "Code Red Worm" Exploiting Buffer Overflow In IIS Indexing Service DLL, Advisory CA-2001-19, July 2001
    • (2001) Code Red Worm
  • 7
    • 18744414325 scopus 로고    scopus 로고
    • The WWW common gateway Interface, version 1.1.
    • June
    • K. Coar, D. Robinson, The WWW Common Gateway Interface, Version 1.1. Internet Draft, June 1999
    • (1999) Internet Draft
    • Coar, K.1    Robinson, D.2
  • 8
    • 18844393573 scopus 로고    scopus 로고
    • csSearch, 2004. Available from:
    • (2004)
  • 11
    • 0003355701 scopus 로고    scopus 로고
    • Hypertext transfer protocol-HTTP/1.1
    • June
    • R. Fielding et al., Hypertext Transfer Protocol-HTTP/1.1. RFC 2616, June 1999
    • (1999) RFC , vol.2616
    • Fielding, R.1
  • 17
    • 18844422582 scopus 로고    scopus 로고
    • IMP Webmail Client. Available from:
  • 18
    • 18844427948 scopus 로고    scopus 로고
    • ISS, Realsecure. Available from:
  • 21
    • 0030677523 scopus 로고    scopus 로고
    • Execution monitoring of security-critical programs in distributed systems: A specification-based approach
    • Oakland, CA, May
    • C. Ko, M. Ruschitzka, K. Levitt, Execution monitoring of security-critical programs in distributed systems: a specification-based approach, in: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 1997, pp. 175-187
    • (1997) Proceedings of the IEEE Symposium on Security and Privacy , pp. 175-187
    • Ko, C.1    Ruschitzka, M.2    Levitt, K.3
  • 23
    • 0142157009 scopus 로고    scopus 로고
    • On the detection of anomalous system call arguments
    • Proceedings of the 8th European symposium on research in computer security (ESORICS '03), Gjovik, Norway, October 2003, Springer-Verlag
    • C. Kruegel, D. Mutz, F. Valeur, and G. Vigna On the detection of anomalous system call arguments Proceedings of the 8th European symposium on research in computer security (ESORICS '03), Gjovik, Norway, October 2003 LNCS 2003 Springer-Verlag 326 343
    • (2003) LNCS , pp. 326-343
    • Kruegel, C.1    Mutz, D.2    Valeur, F.3    Vigna, G.4
  • 27
    • 84885774862 scopus 로고    scopus 로고
    • A framework for constructing features and models for intrusion detection systems
    • W. Lee, and S. Stolfo A framework for constructing features and models for intrusion detection systems ACM Transactions on Information and System Security 3 4 2000 227 261
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.4 , pp. 227-261
    • Lee, W.1    Stolfo, S.2
  • 29
  • 30
    • 0032630098 scopus 로고    scopus 로고
    • Detecting computer and network misuse with the production-based expert system toolset (P-BEST)
    • Oakland, CA, May
    • U. Lindqvist, P.A. Porras, Detecting computer and network misuse with the production-based expert system toolset (P-BEST), in: IEEE Symposium on Security and Privacy, Oakland, CA, May 1999, pp. 146-161
    • (1999) IEEE Symposium on Security and Privacy , pp. 146-161
    • Lindqvist, U.1    Porras, P.A.2
  • 33
    • 85084164413 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • San Antonio, TX, January
    • V. Paxson, Bro: a system for detecting network intruders in real-time, in: Proceedings of the 7th USENIX Security Symposium, San Antonio, TX, January 1998
    • (1998) Proceedings of the 7th USENIX Security Symposium
    • Paxson, V.1
  • 34
    • 18844433715 scopus 로고    scopus 로고
    • Phorum: PHP Message Board. Available from:
  • 37
    • 85090433665 scopus 로고    scopus 로고
    • Snort-lightweight intrusion detection for networks
    • Seattle, WA, November
    • M. Roesch, Snort-lightweight intrusion detection for networks, in: Proceedings of the USENIX LISA '99 Conference, Seattle, WA, November 1999
    • (1999) Proceedings of the USENIX LISA '99 Conference
    • Roesch, M.1
  • 44
    • 0001790593 scopus 로고
    • Depth-first search and linear graph algorithms
    • R. Tarjan Depth-first search and linear graph algorithms SIAM Journal of Computing 1 2 1972 10 20
    • (1972) SIAM Journal of Computing , vol.1 , Issue.2 , pp. 10-20
    • Tarjan, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.