메뉴 건너뛰기




Volumn 5758 LNCS, Issue , 2009, Pages 21-40

Protecting a moving target: Addressing web application concept drift

Author keywords

Anomaly Detection; Concept Drift; Machine Learning; Web Application Security

Indexed keywords

ANOMALY DETECTION; ANOMALY DETECTION MODELS; ANOMALY MODELS; AUTOMATIC DETECTION; CONCEPT DRIFTS; FALSE POSITIVE; INTRUSION DETECTION SYSTEMS; MACHINE LEARNING TECHNIQUES; MACHINE-LEARNING; MOVING TARGETS; NEW STRUCTURES; NORMAL BEHAVIOR; NOVEL TECHNIQUES; REAL-WORLD APPLICATION; SECURITY OFFICERS; WEB APPLICATION; WEB APPLICATION SECURITY;

EID: 76649142367     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-04342-0_2     Document Type: Conference Paper
Times cited : (58)

References (31)
  • 4
    • 2942533003 scopus 로고    scopus 로고
    • SAD: Web session anomaly detection based on parameter estimation
    • Cho, S., Cha, S.: SAD: web session anomaly detection based on parameter estimation. In: Computers & Security, vol. 23, pp. 312-319 (2004)
    • (2004) Computers & Security , vol.23 , pp. 312-319
    • Cho, S.1    Cha, S.2
  • 5
    • 18844395404 scopus 로고    scopus 로고
    • A Multi-model Approach to the Detection of Web-based Attacks
    • Kruegel, C., Robertson, W., Vigna, G.: A Multi-model Approach to the Detection of Web-based Attacks. Journal of Computer Networks 48(5), 717-738 (2005)
    • (2005) Journal of Computer Networks , vol.48 , Issue.5 , pp. 717-738
    • Kruegel, C.1    Robertson, W.2    Vigna, G.3
  • 8
    • 76649144648 scopus 로고    scopus 로고
    • Zanero, S., Criscione, C.: Masibty: A Web Application Firewall based on Anomaly Detection. In: DeepSec - In-depth security conference (November 2008)
    • Zanero, S., Criscione, C.: Masibty: A Web Application Firewall based on Anomaly Detection. In: DeepSec - In-depth security conference (November 2008)
  • 9
    • 84868164585 scopus 로고    scopus 로고
    • Inc, Citrix Application Firewall January
    • Citrix Systems, Inc.: Citrix Application Firewall (January 2009), http://www.citrix.com/English/PS2/products/product.asp?contentID=25636
    • (2009)
    • Systems, C.1
  • 10
    • 84868163869 scopus 로고    scopus 로고
    • F5 Networks, Inc, January 2009
    • F5 Networks, Inc.: BIG-IP Application Security Manager (January 2009), http://www.f5.com/products/big-ip/product-modules/application-security-manager. html
    • BIG-IP Application Security Manager
  • 11
    • 84868177005 scopus 로고    scopus 로고
    • Breach Security, Inc, January 2009
    • Breach Security, Inc.: Breach WebDefend (January 2009), http://www.breach.com/products/webdefend.html
    • Breach WebDefend
  • 15
    • 62849113350 scopus 로고    scopus 로고
    • Noise-Resistant Payload Anomaly Detection for Network Intrusion Detection Systems
    • Austin, TX, USA, pp, IEEE Computer Society, Los Alamitos
    • Kim, S.i., Nwanze, N.: Noise-Resistant Payload Anomaly Detection for Network Intrusion Detection Systems. In: Proceedings of the Performance, Computing and Communications Conference (IPCCC 2008), Austin, TX, USA, pp. 517-523. IEEE Computer Society, Los Alamitos (2008)
    • (2008) Proceedings of the Performance, Computing and Communications Conference (IPCCC , pp. 517-523
    • Kim, S.I.1    Nwanze, N.2
  • 17
    • 76649099342 scopus 로고    scopus 로고
    • Song, Y., Stolfo, S., Keromytis, A.: Spectrogram: A Mixture-of-Markov- Chains Model for Anomaly Detection in Web Traffic. In: Proc. of the 16th Annual Network and Distributed System Security Symposium, NDSS (2009)
    • Song, Y., Stolfo, S., Keromytis, A.: Spectrogram: A Mixture-of-Markov- Chains Model for Anomaly Detection in Web Traffic. In: Proc. of the 16th Annual Network and Distributed System Security Symposium, NDSS (2009)
  • 19
    • 37749050180 scopus 로고    scopus 로고
    • Dynamic weighted majority: An ensemble method for drifting concepts
    • Kolter, J., Maloof, M.: Dynamic weighted majority: An ensemble method for drifting concepts. The Journal of Machine Learning Research 8, 2755-2790 (2007)
    • (2007) The Journal of Machine Learning Research , vol.8 , pp. 2755-2790
    • Kolter, J.1    Maloof, M.2
  • 23
    • 84885774862 scopus 로고    scopus 로고
    • A Framework for Constructing Features and Models for Intrusion Detection Systems
    • Lee, W., Stolfo, S.J.: A Framework for Constructing Features and Models for Intrusion Detection Systems. ACM Transactions on Information and System Security 3(4), 227-261 (2000)
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.4 , pp. 227-261
    • Lee, W.1    Stolfo, S.J.2
  • 26
    • 0034836394 scopus 로고    scopus 로고
    • Intrusion Detection via Static Analysis
    • Oakland, CA, USA, pp, IEEE Computer Society, Los Alamitos
    • Wagner, D., Dean, D.: Intrusion Detection via Static Analysis. In: Proceedings of the IEEE Symposium on Security and Privacy (S&P 2001), Oakland, CA, USA, pp. 156-168. IEEE Computer Society, Los Alamitos (2001)
    • (2001) Proceedings of the IEEE Symposium on Security and Privacy (S&P , pp. 156-168
    • Wagner, D.1    Dean, D.2
  • 28
    • 35048885009 scopus 로고    scopus 로고
    • Wang, K., Stolfo, S.J.: Anomalous Payload-based Network Intrusion Detection. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, 3224, pp. 203-222. Springer, Heidelberg (2004)
    • Wang, K., Stolfo, S.J.: Anomalous Payload-based Network Intrusion Detection. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol. 3224, pp. 203-222. Springer, Heidelberg (2004)
  • 29
    • 33750335757 scopus 로고    scopus 로고
    • Wang, K., Parekh, J.J., Stolfo, S.J.: Anagram: A Content Anomaly Detector Resistant to Mimicry Attack. In: Zamboni, D., Krügel, C. (eds.) RAID 2006. LNCS, 4219, pp. 226-248. Springer, Heidelberg (2006)
    • Wang, K., Parekh, J.J., Stolfo, S.J.: Anagram: A Content Anomaly Detector Resistant to Mimicry Attack. In: Zamboni, D., Krügel, C. (eds.) RAID 2006. LNCS, vol. 4219, pp. 226-248. Springer, Heidelberg (2006)
  • 30
    • 33745165284 scopus 로고    scopus 로고
    • Zanero, S.: Analyzing TCP traffic patterns using self organizing maps. In: Roli, F., Vitulano, S. (eds.) ICIAP 2005. LNCS, 3617, pp. 83-90. Springer, Heidelberg (2005)
    • Zanero, S.: Analyzing TCP traffic patterns using self organizing maps. In: Roli, F., Vitulano, S. (eds.) ICIAP 2005. LNCS, vol. 3617, pp. 83-90. Springer, Heidelberg (2005)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.