메뉴 건너뛰기




Volumn , Issue , 2009, Pages

HMM-web: A framework for the detection of attacks against web applications

Author keywords

Hidden markov models; Intrusion detection; Multiple classifiers system; Web applications

Indexed keywords

FALSE ALARM RATE; HIGH DETECTION RATE; INPUT VALIDATION; INTERNET SERVICES; MANAGE INFORMATION; MULTIPLE CLASSIFIERS SYSTEM; QUERY ANALYSIS; REAL WORLD DATA; REMOTE MACHINES; TRAINING SETS; WEB APPLICATION; WEB APPLICATION VULNERABILITY; WEB APPLICATIONS; WEB-BASED ARCHITECTURE;

EID: 70449490765     PISSN: 05361486     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICC.2009.5199054     Document Type: Conference Paper
Times cited : (38)

References (17)
  • 1
    • 70449477953 scopus 로고    scopus 로고
    • milw0rm, www.milw0rm.com.
    • milw0rm, www.milw0rm.com.
  • 2
    • 50049098282 scopus 로고    scopus 로고
    • Modsecurity, www.modsecurity.org.
    • Modsecurity
  • 3
    • 37349085065 scopus 로고    scopus 로고
    • Sensing attacks in computers network with hidden markov models
    • MLDM 2007
    • Ariu D., Giacinto G., and Perdisci R. Sensing attacks in computers network with hidden markov models. MLDM 2007, LNAI 4571:795-809.
    • LNAI , vol.4571 , pp. 795-809
    • Ariu, D.1    Giacinto, G.2    Perdisci, R.3
  • 6
    • 14844322335 scopus 로고    scopus 로고
    • Testing network-based intrusion detection signatures using mutant exploits
    • Vigna G., Robertson W., and Balzarotti D. Testing network-based intrusion detection signatures using mutant exploits. In ACM CCS, pages 21-30, 2005.
    • (2005) ACM CCS , pp. 21-30
    • Vigna, G.1    Robertson, W.2    Balzarotti, D.3
  • 7
    • 35048885009 scopus 로고    scopus 로고
    • Anomalous payload-based network intrusion detection
    • RAID 2004
    • Wang K. and Stolfo S.J. Anomalous payload-based network intrusion detection. RAID 2004, LNCS 3224:203-222.
    • LNCS , vol.3224 , pp. 203-222
    • Wang, K.1    Stolfo, S.J.2
  • 8
    • 33846369107 scopus 로고    scopus 로고
    • Learning dfa representations of http for protecting web applications
    • Ingham K.L., Somayaji A., Burge J., and Forrest S. Learning dfa representations of http for protecting web applications. Computer Networks, 51:1239-1255, 2007.
    • (2007) Computer Networks , vol.51 , pp. 1239-1255
    • Ingham, K.L.1    Somayaji, A.2    Burge, J.3    Forrest, S.4
  • 9
    • 18844395404 scopus 로고    scopus 로고
    • A multi-model approach to the detection of web-based attacks
    • C. Kruegel, G. Vigna, and W. Robertson. A multi-model approach to the detection of web-based attacks. Computer Networks, 48(5):717-738, 2005.
    • (2005) Computer Networks , vol.48 , Issue.5 , pp. 717-738
    • Kruegel, C.1    Vigna, G.2    Robertson, W.3
  • 11
    • 0024610919 scopus 로고
    • A tutorial on hidden markov models and selected applications in speech recognition
    • Rabiner L.R. A tutorial on hidden markov models and selected applications in speech recognition. Proceedings of the IEEE, 77(2):257-286, 1989.
    • (1989) Proceedings of the IEEE , vol.77 , Issue.2 , pp. 257-286
    • Rabiner, L.R.1
  • 13
    • 60349101742 scopus 로고    scopus 로고
    • Using an ensemble of one-class svm classifiers to harden payload-based anomaly detection systems
    • Perdisci R., Gu G., and Lee W. Using an ensemble of one-class svm classifiers to harden payload-based anomaly detection systems. ICDM, 2006:488-498.
    • (2006) ICDM , pp. 488-498
    • Perdisci, R.1    Gu, G.2    Lee, W.3
  • 14
    • 70449468627 scopus 로고    scopus 로고
    • SANS institute. Detecting attacks on web applications from log files
    • www.sans.org Roger Meyer, SANS institute. Detecting attacks on web applications from log files, 2008.
    • (2008)
    • Meyer, R.1
  • 16
    • 70449508954 scopus 로고    scopus 로고
    • OWASP www.owasp.org. The ten most critical web application vulnerabilities, 2007.
    • OWASP www.owasp.org. The ten most critical web application vulnerabilities, 2007.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.