메뉴 건너뛰기




Volumn 7743 LNCS, Issue , 2013, Pages 45-61

Detection of HTTP-GET attack with clustering and information theoretic measurements

Author keywords

Clustering; HTTP GET Attack; Information Theory; Intrusion Detection

Indexed keywords

CLUSTERING; CLUSTERING TECHNIQUES; ENTROPY-BASED; HTTP PROTOCOLS; HTTP-GET ATTACK; WEB SERVERS;

EID: 84875966213     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-37119-6_4     Document Type: Conference Paper
Times cited : (3)

References (27)
  • 2
    • 79955482186 scopus 로고    scopus 로고
    • Hmmpayl: An intrusion detection system based on hidden markov models
    • Ariu, D., Tronci, R., Giacinto, G.: Hmmpayl: An intrusion detection system based on hidden markov models. Computers and Security 30(4), 221-241 (2011)
    • (2011) Computers and Security , vol.30 , Issue.4 , pp. 221-241
    • Ariu, D.1    Tronci, R.2    Giacinto, G.3
  • 5
    • 0023294428 scopus 로고
    • An intrusion-detection model
    • Denning, D.E.: An intrusion-detection model. IEEE Trans. Softw. Eng. 13(2), 222-232 (1987)
    • (1987) IEEE Trans. Softw. Eng. , vol.13 , Issue.2 , pp. 222-232
    • Denning, D.E.1
  • 6
    • 33846369107 scopus 로고    scopus 로고
    • Learning dfa representations of http for protecting web applications
    • From Intrusion Detection to Self-Protection
    • Ingham, K.L., Somayaji, A., Burge, J., Forrest, S.: Learning dfa representations of http for protecting web applications. Computer Networks 51(5), 1239-1255 (2007); From Intrusion Detection to Self-Protection
    • (2007) Computer Networks , vol.51 , Issue.5 , pp. 1239-1255
    • Ingham, K.L.1    Somayaji, A.2    Burge, J.3    Forrest, S.4
  • 9
    • 18844395404 scopus 로고    scopus 로고
    • A multi-model approach to the detection of web-based attacks
    • Kruegel, C., Vigna, G., Robertson, W.: A multi-model approach to the detection of web-based attacks. Comput. Netw. 48(5), 717-738 (2005)
    • (2005) Comput. Netw. , vol.48 , Issue.5 , pp. 717-738
    • Kruegel, C.1    Vigna, G.2    Robertson, W.3
  • 12
    • 78650681741 scopus 로고    scopus 로고
    • A novel prediction model based on hierarchical characteristic of web site
    • Lee, C.-H., Lo, Y.L., Fu, Y.-H.: A novel prediction model based on hierarchical characteristic of web site. Expert Systems with Applications 38(4), 3422-3430 (2011)
    • (2011) Expert Systems with Applications , vol.38 , Issue.4 , pp. 3422-3430
    • Lee, C.-H.1    Lo, Y.L.2    Fu, Y.-H.3
  • 13
    • 84964247755 scopus 로고    scopus 로고
    • Sequence-order-independent network profiling for detecting application layer ddos attacks
    • Lee, S., Kim, G., Kim, S.: Sequence-order-independent network profiling for detecting application layer ddos attacks. EURASIP Journal on Wireless Communications and Networking 2011(1), 50 (2011)
    • (2011) EURASIP Journal on Wireless Communications and Networking , vol.2011 , Issue.1 , pp. 50
    • Lee, S.1    Kim, G.2    Kim, S.3
  • 14
    • 84885774862 scopus 로고    scopus 로고
    • A framework for constructing features and models for intrusion detection systems
    • Lee, W., Stolfo, S.J.: A framework for constructing features and models for intrusion detection systems. ACM Trans. Inf. Syst. Secur. 3, 227-261 (2000)
    • (2000) ACM Trans. Inf. Syst. Secur. , vol.3 , pp. 227-261
    • Lee, W.1    Stolfo, S.J.2
  • 15
    • 0034836392 scopus 로고    scopus 로고
    • Information-theoretic measures for anomaly detection
    • Lee, W., Xiang, D.: Information-theoretic measures for anomaly detection. In: IEEE Symposium on Security and Privacy, pp. 130-143 (2001)
    • (2001) IEEE Symposium on Security and Privacy , pp. 130-143
    • Lee, W.1    Xiang, D.2
  • 17
    • 79955639952 scopus 로고    scopus 로고
    • Sbad: Sequence based attack detection via sequence comparison
    • Mao, C.-H., Pao, H.-K., Faloutsos, C., Lee, H.-M.: Sbad: Sequence based attack detection via sequence comparison. In: PSDML, pp. 78-91 (2010)
    • (2010) PSDML , pp. 78-91
    • Mao, C.-H.1    Pao, H.-K.2    Faloutsos, C.3    Lee, H.-M.4
  • 20
    • 47249148481 scopus 로고    scopus 로고
    • Mitigating application-level denial of service attacks on Web servers: A client-transparent approach
    • Srivatsa, M., Iyengar, A., Yin, J., Liu, L.: Mitigating application-level denial of service attacks on Web servers: A client-transparent approach. ACM Trans. Web 2, 15:1-15:49 (2008)
    • (2008) ACM Trans. Web , vol.2
    • Srivatsa, M.1    Iyengar, A.2    Yin, J.3    Liu, L.4
  • 21
    • 84856441401 scopus 로고    scopus 로고
    • Unsupervised Clustering of Web Sessions to Detect Malicious and Non-malicious Website Users
    • Stevanovic, D., Vlajic, N., An, A.: Unsupervised Clustering of Web Sessions to Detect Malicious and Non-malicious Website Users. Procedia CS 5, 123-131 (2011)
    • (2011) Procedia CS , vol.5 , pp. 123-131
    • Stevanovic, D.1    Vlajic, N.2    An, A.3
  • 22
    • 84875926244 scopus 로고    scopus 로고
    • Detection of malicious and non-malicious website visitors using unsupervised neural network learning
    • Stevanovic, D., Vlajic, N., An, A.: Detection of malicious and non-malicious website visitors using unsupervised neural network learning. Applied Soft Computing (2012)
    • (2012) Applied Soft Computing
    • Stevanovic, D.1    Vlajic, N.2    An, A.3
  • 24
    • 78650910973 scopus 로고    scopus 로고
    • A Two-Tier System for Web Attack Detection Using Linear Discriminant Method
    • Soriano, M., Qing, S., López, J. (eds.) ICICS 2010. Springer, Heidelberg
    • Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R.P., Jia, W., Yeh, W.-C.: A Two-Tier System for Web Attack Detection Using Linear Discriminant Method. In: Soriano, M., Qing, S., López, J. (eds.) ICICS 2010. LNCS, vol. 6476, pp. 459-471. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6476 , pp. 459-471
    • Tan, Z.1    Jamdagni, A.2    He, X.3    Nanda, P.4    Liu, R.P.5    Jia, W.6    Yeh, W.-C.7
  • 25
    • 78650414316 scopus 로고    scopus 로고
    • Massively parallel acceleration of a document-similarity classifier to detect web attacks
    • Data Intensive Computing
    • Ulmer, C., Gokhale, M., Gallagher, B., Top, P., Eliassi-Rad, T.: Massively parallel acceleration of a document-similarity classifier to detect web attacks. Journal of Parallel and Distributed Computing 71(2), 225-235 (2011); Data Intensive Computing
    • (2011) Journal of Parallel and Distributed Computing , vol.71 , Issue.2 , pp. 225-235
    • Ulmer, C.1    Gokhale, M.2    Gallagher, B.3    Top, P.4    Eliassi-Rad, T.5
  • 27
    • 61449135082 scopus 로고    scopus 로고
    • Monitoring the application-layer DDoS attacks for popular websites
    • Xie, Y., Yu, S.-Z.: Monitoring the application-layer DDoS attacks for popular websites. IEEE/ACM Trans. Netw. 17, 15-25 (2009)
    • (2009) IEEE/ACM Trans. Netw. , vol.17 , pp. 15-25
    • Xie, Y.1    Yu, S.-Z.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.