메뉴 건너뛰기




Volumn 9, Issue 4, 2012, Pages 512-525

DoubleGuard: Detecting intrusions in multitier web applications

Author keywords

Anomaly detection; multitier web application.; virtualization

Indexed keywords

ANOMALY DETECTION; BEHAVIORAL RESEARCH; DATABASE SYSTEMS; NETWORK SECURITY; VIRTUAL REALITY; VIRTUALIZATION; WEBSITES;

EID: 84861175145     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2011.59     Document Type: Article
Times cited : (39)

References (52)
  • 1
    • 84861179308 scopus 로고    scopus 로고
    • SANS
    • SANS, "The Top Cyber Security Risks," http://www.sans.org/top- cyber-security-risks/, 2011.
    • (2011) The Top Cyber Security Risks
  • 2
    • 84861150187 scopus 로고    scopus 로고
    • National Vulnerability Database
    • National Vulnerability Database, "Vulnerability Summary for CVE-2010-4332," http://web.nvd.nist.gov/view/vuln/detail? vulnId= CVE-2010-4332, 2011.
    • (2011) Vulnerability Summary for CVE-2010-4332
  • 3
    • 84861124610 scopus 로고    scopus 로고
    • National Vulnerability Database
    • National Vulnerability Database, "Vulnerability Summary for CVE-2010-4333," http://web.nvd.nist.gov/view/vuln/detail? vulnId=CVE-2010-4333, 2011.
    • (2011) Vulnerability Summary for CVE-2010-4333
  • 4
    • 84861121279 scopus 로고    scopus 로고
    • Autobench, http://www.xenoclast.org/autobench/, 2011.
    • (2011) Autobench
  • 7
    • 84861144136 scopus 로고    scopus 로고
    • greensql
    • greensql, http://www.greensql.net/, 2011.
    • (2011)
  • 8
    • 84861144132 scopus 로고    scopus 로고
    • httperf
    • httperf, http://www.hpl.hp.com/research/linux/httperf/, 2011.
    • (2011)
  • 9
    • 84861179727 scopus 로고    scopus 로고
    • httpload
    • httpload, http://www.acme.com/software/http-load/, 2011.
    • (2011)
  • 10
    • 84861144230 scopus 로고    scopus 로고
    • Joomla cms
    • Joomla cms, http://www.joomla.org/, 2011.
    • (2011)
  • 11
    • 84861144225 scopus 로고    scopus 로고
    • Linux-vserver
    • Linux-vserver, http://linux-vserver.org/, 2011.
    • (2011)
  • 12
    • 84861144228 scopus 로고    scopus 로고
    • metasploit
    • metasploit, http://www.metasploit.com/, 2011.
    • (2011)
  • 13
    • 84861144229 scopus 로고    scopus 로고
    • nikto
    • nikto, http://cirt.net/nikto2, 2011.
    • (2011)
  • 14
    • 84861144226 scopus 로고    scopus 로고
    • Openvz
    • Openvz, http://wiki.openvz.org, 2011.
    • (2011)
  • 15
    • 84861144227 scopus 로고    scopus 로고
    • Seleniumhq
    • Seleniumhq, http://seleniumhq.org/, 2011.
    • (2011)
  • 16
    • 84861179729 scopus 로고    scopus 로고
    • sqlmap
    • sqlmap, http://sqlmap.sourceforge.net/, 2011.
    • (2011)
  • 17
    • 84863886319 scopus 로고    scopus 로고
    • "Virtuozzo Containers," http://www.parallels.com/products/ pvc45/, 2011.
    • (2011) Virtuozzo Containers
  • 18
    • 84861165536 scopus 로고    scopus 로고
    • "Wordpress," http://www.wordpress.org/, 2011.
    • (2011) Wordpress
  • 19
    • 84861144134 scopus 로고    scopus 로고
    • "Wordpress Bug," http://core.trac.wordpress.org/ticket/5487, 2011.
    • (2011) Wordpress Bug
  • 22
    • 74849109764 scopus 로고    scopus 로고
    • Syntax, and semantics-based signature database for hybrid intrusion detection systems
    • B.I.A. Barry and H.A. Chan, "Syntax, and Semantics-Based Signature Database for Hybrid Intrusion Detection Systems," Security and Comm. Networks, vol. 2, no. 6, pp. 457-475, 2009.
    • (2009) Security and Comm. Networks , vol.2 , Issue.6 , pp. 457-475
    • Barry, B.I.A.1    Chan, H.A.2
  • 26
    • 0033293396 scopus 로고    scopus 로고
    • Towards a taxonomy of intrusion-detection systems
    • H. Debar, M. Dacier, and A. Wespi, "Towards a Taxonomy of Intrusion-Detection Systems," Computer Networks, vol. 31, no. 9, pp. 805-822, 1999.
    • (1999) Computer Networks , vol.31 , Issue.9 , pp. 805-822
    • Debar, H.1    Dacier, M.2    Wespi, A.3
  • 28
    • 2442430540 scopus 로고    scopus 로고
    • A data mining approach for database intrusion detection
    • H. Haddad, A. Omicini, R.L. Wainwright, and L.M. Liebrock, eds.
    • Y. Hu and B. Panda, "A Data Mining Approach for Database Intrusion Detection," Proc. ACM Symp. Applied Computing (SAC), H. Haddad, A. Omicini, R.L. Wainwright, and L.M. Liebrock, eds., 2004.
    • (2004) Proc. ACM Symp. Applied Computing (SAC)
    • Hu, Y.1    Panda, B.2
  • 30
    • 85084163246 scopus 로고    scopus 로고
    • Autograph: Toward automated distributed worm signature detection
    • H.-A. Kim and B. Karp, "Autograph: Toward Automated Distributed Worm Signature Detection," Proc. USENIX Security Symp., 2004.
    • (2004) Proc. USENIX Security Symp.
    • Kim, H.-A.1    Karp, B.2
  • 33
    • 33745800070 scopus 로고    scopus 로고
    • Fast and automated generation of attack signatures: A basis for building self-protecting servers
    • Liang and Sekar, "Fast and Automated Generation of Attack Signatures: A Basis for Building Self-Protecting Servers," SIGSAC: Proc. 12th ACM Conf. Computer and Comm. Security, 2005.
    • (2005) SIGSAC: Proc. 12th ACM Conf. Computer and Comm. Security
    • Liang1    Sekar2
  • 37
    • 85077127256 scopus 로고    scopus 로고
    • Apiary: Easy-to-use desktop application fault containment on commodity operating systems
    • S. Potter and J. Nieh, "Apiary: Easy-to-Use Desktop Application Fault Containment on Commodity Operating Systems," Proc. USENIX Ann. Technical Conf., 2010.
    • (2010) Proc. USENIX Ann. Technical Conf.
    • Potter, S.1    Nieh, J.2
  • 44
    • 70350394979 scopus 로고    scopus 로고
    • Database intrusion detection using weighted sequence mining
    • A. Srivastava, S. Sural, and A.K. Majumdar, "Database Intrusion Detection Using Weighted Sequence Mining," J. Computers, vol. 1, no. 4, pp. 8-17, 2006.
    • (2006) J. Computers , vol.1 , Issue.4 , pp. 8-17
    • Srivastava, A.1    Sural, S.2    Majumdar, A.K.3
  • 46
    • 12844267418 scopus 로고    scopus 로고
    • Secure program execution via dynamic information flow tracking
    • Nov.
    • G.E. Suh, J.W. Lee, D. Zhang, and S. Devadas, "Secure Program Execution via Dynamic Information Flow Tracking," ACM SIGPLAN Notices, vol. 39, no. 11, pp. 85-96, Nov. 2004.
    • (2004) ACM SIGPLAN Notices , vol.39 , Issue.11 , pp. 85-96
    • Suh, G.E.1    Lee, J.W.2    Zhang, D.3    Devadas, S.4
  • 48
    • 0037105910 scopus 로고    scopus 로고
    • Intrusion detection techniques and approaches
    • DOI 10.1016/S0140-3664(02)00037-3, PII S0140366402000373
    • T. Verwoerd and R. Hunt, "Intrusion Detection Techniques and Approaches," Computer Comm., vol. 25, no. 15, pp. 1356-1365, 2002. (Pubitemid 34506182)
    • (2002) Computer Communications , vol.25 , Issue.15 , pp. 1356-1365
    • Verwoerd, T.1    Hunt, R.2
  • 50
    • 68149139611 scopus 로고    scopus 로고
    • Reducing errors in the anomaly-based detection of web-based attacks through the combined analysis of web requests and SQL queries
    • G. Vigna, F. Valeur, D. Balzarotti, W.K. Robertson, C. Kruegel, and E. Kirda, "Reducing Errors in the Anomaly-Based Detection of Web-Based Attacks through the Combined Analysis of Web Requests and SQL Queries," J. Computer Security, vol. 17, no. 3, pp. 305-329, 2009.
    • (2009) J. Computer Security , vol.17 , Issue.3 , pp. 305-329
    • Vigna, G.1    Valeur, F.2    Balzarotti, D.3    Robertson, W.K.4    Kruegel, C.5    Kirda, E.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.